Cryptology ePrint Archive: Report 2014/100

Improved Slender-set Linear Cryptanalysis

Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi

Abstract: In 2013, Borghoff \emph{et al}. introduced a slender-set linear cryptanalysis on PRESENT-like ciphers with key-dependent secret S-boxes. In this paper, we propose an improved slender-set linear attack to PRESENT-like ciphers with secret S-boxes. We investigate three new cryptanalytic techniques, and use them to recover the secret S-boxes efficiently. Our first new idea is that we propose a new technique to support consistency of partitions of the input to the secret S-boxes. Our second new technique is that we present a more efficient method to recover the coordinate functions of secret S-boxes based on more information than that of Borghoff's attack. The third new technique is that we propose a method of constructing all correct coordinate function of secret S-boxes by pruning search algorithm. In particular, we implemented a successful linear attack on the full round Maya in practice. In our experiments, the correct S-box can be recovered with $2^{36}$ known plaintexts, $2^{18.9}$ time complexity and negligible memory complexity at a success rate of 87.5\%. Our attack is the improvement and sequel of Borghoff's work on PRESENT-like cipher with secret S-boxes.

Category / Keywords: block cipher, linear cryptanalysis, PRESENT-like, secret S-box

Original Publication (with minor differences): IACR-FSE-2014

Date: received 11 Feb 2014, last revised 12 Feb 2014

Contact author: liuguoqiang87 at hotmail com

Available format(s): PDF | BibTeX Citation

Note: This is the full version of the FSE 2014 paper with the same title.

Version: 20140214:175853 (All versions of this report)

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]