It is remarked that the second is found by Wu and Preneel, and has been used to find $2^{96}$ weak keys. In the cryptanalysis of ABC, Wu and Preneel only utilized its estimated probability advantage which is concluded by experimental data, and they did not give its strict proof.
Modular Addition and XOR operations are widely used in designing symmetric ciphers. We believe that these types of linear expressions with probability advantages not only can be used to analyze some other symmetric ciphers, but also are important criteria in designing secure symmetric ciphers.
Category / Keywords: secret-key cryptography / stream ciphers Date: received 13 Jul 2006 Contact author: xywang at sdu edu cn Available format(s): PDF | BibTeX Citation Version: 20060714:062853 (All versions of this report) Short URL: ia.cr/2006/242 Discussion forum: Show discussion | Start new discussion