Paper 2018/935

Distinguishing Error of Nonlinear Invariant Attacks

Subhabrata Samajder and Palash Sarkar

Abstract

Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daeman and Rijmen (2007) had obtained the distributions of the correlations between linear input and output combiners of uniform random functions and uniform random permutations. Our first contribution is to generalise these results to obtain the distributions of the correlations between arbitrary input and output combiners of uniform random functions and uniform random permutations. Recently, Todo et al. (2018) have proposed nonlinear invariant attacks which consider correlations between nonlinear input and output combiners for a key-alternating block cipher. In its basic form, a nonlinear invariant attack is a distinguishing attack. The second and the main contribution of this paper is to obtain precise expressions for the errors of nonlinear invariant attacks in distinguishing a key-alternating cipher from either a uniform random function or a uniform random permutation.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
correlationuniform random functionuniform random permutationblock ciphernonlinear invariant attackdistinguishing attackerror probability
Contact author(s)
palash @ isical ac in
History
2018-10-02: received
Short URL
https://ia.cr/2018/935
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/935,
      author = {Subhabrata Samajder and Palash Sarkar},
      title = {Distinguishing Error of Nonlinear Invariant Attacks},
      howpublished = {Cryptology {ePrint} Archive, Paper 2018/935},
      year = {2018},
      url = {https://eprint.iacr.org/2018/935}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.