Changing probabilities of differentials and linear sums via isomorphisms of ciphers
Alexander Rostovtsev
Abstract
\begin{document}
Ciphers and are isomorphic if there exists invertible
computable in both directions map , , . Cipher is vulnerable if and only if isomorphic
cipher is vulnerable. Instead of computing the key of a cipher it is
sufficient to find suitable isomorphic cipher and compute its key. If
is arbitrary substitution and is round substitution, its
conjugate is cipher isomorphism. Conjugate
substitutions have the same cycle type. Conjugation can be composed with
affine maps.
Combining conjugation and affine equivalence, sometimes we can transform
non-linear special -box to conjugate affine substitution . Usually for
given , there are many different auxiliary substitutions .
Conjugate diffusion map and XOR operation become non-linear, but taking
appropriate we can get large probabilities of differentials and
linear sums of diffusion map and XOR.
For example AES substitution (as finite field inverting) is approximately
conjugate with bit changing substitution. That conjugate substitution has
differentials and linear sums of probability 1. Corresponding byte
substitution defines non-linear conjugate diffusion map and
non-linear conjugate to XOR operation with round key. Probabilities of differentials
(biases of linear sums) of byte substitution of conjugate diffusion map are
8-12 times more then corresponding values of original -box.
Probabilities of differentials of conjugate XOR with the round key byte
depends on the round key and can be 1 for some key bytes.
@misc{cryptoeprint:2009/117,
author = {Alexander Rostovtsev},
title = {Changing probabilities of differentials and linear sums via isomorphisms of ciphers},
howpublished = {Cryptology {ePrint} Archive, Paper 2009/117},
year = {2009},
url = {https://eprint.iacr.org/2009/117}
}
Note: In order to protect the privacy of readers, eprint.iacr.org
does not use cookies or embedded third party content.