Cryptology ePrint Archive: Report 2014/100
Improved Slender-set Linear Cryptanalysis
Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi
Abstract: In 2013, Borghoff \emph{et al}. introduced a slender-set linear
cryptanalysis on PRESENT-like ciphers with key-dependent secret
S-boxes. In this paper, we propose an improved slender-set linear
attack to PRESENT-like ciphers with secret S-boxes. We investigate
three new cryptanalytic techniques, and use them to recover the
secret S-boxes efficiently. Our first new idea is that we propose a
new technique to support consistency of partitions of the input to
the secret S-boxes. Our second new technique is that we present a
more efficient method to recover the coordinate functions of secret
S-boxes based on more information than that of Borghoff's attack.
The third new technique is that we propose a method of constructing
all correct coordinate function of secret S-boxes by pruning search
algorithm. In particular, we implemented a successful linear attack
on the full round Maya in practice. In our experiments, the correct
S-box can be recovered with $2^{36}$ known plaintexts, $2^{18.9}$
time complexity and negligible memory complexity at a success rate
of 87.5\%. Our attack is the improvement and sequel of Borghoff's
work on PRESENT-like cipher with secret S-boxes.
Category / Keywords: block cipher, linear cryptanalysis, PRESENT-like, secret S-box
Original Publication (with minor differences): IACR-FSE-2014
Date: received 11 Feb 2014, last revised 12 Feb 2014
Contact author: liuguoqiang87 at hotmail com
Available format(s): PDF | BibTeX Citation
Note: This is the full version of the FSE 2014 paper with the same title.
Version: 20140214:175853 (All versions of this report)
Short URL: ia.cr/2014/100
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]