Linear cryptanalysis of LOKI and s 2DES (original) (raw)

Abstract

This paper discusses linear cryptanalysis of LOKI89, LOKI91 and s 2DES. Our computer program based on Matsui's search algorithm has completely determined their best linear approximate equations, which tell us applicability of linear cryptanalysis to each cryptosystem. As a result, LOKI89 and LOKI91 are resistant to linear cryptanalysis from the viewpoint of the best linear approximate probability, whereas s2DES is breakable by a known-plaintext attack faster than an exhaustive key search. Moreover, our search program, which is also applicable to differential cryptanalysis, has derived their best differential characteristics as well. These values give a complete proof that characteristics found by Knudsen are actually best.

Preview

Unable to display preview. Download preview PDF.

References

  1. Biham,E.,Shamir,A.: Differential Cryptanalysis of the Data Encryption Standard. Springer Verlag (1993)
    Google Scholar
  2. Matsui,M.: Linear Cryptanalysis Method for DES cipher. Advances in Cryptology — Eurocrypt'93, Lecture Notes in Computer Science, Springer-Verlag 765 (1993) 386–397
    Google Scholar
  3. Matsui,M.: On correlation between the order of S-boxes and the strength of DES. Pre-proceedings of Eurocrypt'94 (1994) 375–387
    Google Scholar
  4. Matsui,M.: The First Experimental Cryptanalysis of the Data Encryption Standard. Advances in Cryptology — Crypto'94, Lecture Notes in Computer Science, Springer-Verlag 839 (1994) 1–11
    Google Scholar
  5. Brown,L.,Pieprzyk,J.,Seberry,J.: LOKI-A Cryptographic Primitive for Authentication and Secrecy Applications. Advances in Cryptology — Auscrypt'90, Lecture Notes in Computer Science, Springer-Verlag 453 (1990) 229–236
    Google Scholar
  6. Brown,L.,Kwan,M.,Pieprzyk,J.,Seberry,J.: Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. Advances in Cryptology — Asiacrypt'91, Lecture Notes in Computer Science, Springer-Verlag 739 (1993) 36–50
    Google Scholar
  7. Kim,K.: Construction of DES-like S-boxes Based on Boolean Functions Satisfying the SAC. Advances in Cryptology — Asiacrypt'91, Lecture Notes in Computer Science, Springer-Verlag 739 (1993) 59–72
    Google Scholar
  8. Biham,E.,Shamir,A.: Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Advances in Cryptology — Crypto'91, Lecture Notes in Computer Science, Springer-Verlag 576 (1992) 156–171
    Google Scholar
  9. Knudsen,L.: Cryptanalysis of LOKI. Advances in Cryptology — Asiacrypt'91, Lecture Notes in Computer Science, Springer-Verlag 739 (1993) 22–35
    Google Scholar
  10. Knudsen,L.: Cryptanalysis of LOKI91. Advances in Cryptology — Auscrypt'92, Lecture Notes in Computer Science, Springer-Verlag 718 (1993) 196–208
    Google Scholar
  11. Knudsen,L.: Iterative Characteristics of DES and _s_2-DES. Advances in Cryptology — Crypto'92, Lecture Notes in Computer Science, Springer-Verlag 740 (1993) 497–511
    Google Scholar
  12. Lai,X.,Massey,J.,Murphy,S.: Markov ciphers and differential cryptanalysis. Advances in Cryptology — Eurocrypt'91, Lecture Notes in Computer Science, Springer-Verlag 547 (1991) 17–38
    Google Scholar
  13. Nyberg,K.: Linear Approximation of Block Ciphers. Presented at Rump Session in Eurocrypt'94
    Google Scholar

Download references

Author information

Authors and Affiliations

  1. Computer & Information Systems Laboratory, Mitsubishi Electric Corporation, 5-1-1, Ofuna, Kamakura, 247, Kanagawa, Japan
    Toshio Tokita, Tohru Sorimachi & Mitsuru Matsui

Authors

  1. Toshio Tokita
    You can also search for this author inPubMed Google Scholar
  2. Tohru Sorimachi
    You can also search for this author inPubMed Google Scholar
  3. Mitsuru Matsui
    You can also search for this author inPubMed Google Scholar

Editor information

Josef Pieprzyk Reihanah Safavi-Naini

Rights and permissions

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tokita, T., Sorimachi, T., Matsui, M. (1995). Linear cryptanalysis of LOKI and s 2DES. In: Pieprzyk, J., Safavi-Naini, R. (eds) Advances in Cryptology — ASIACRYPT'94. ASIACRYPT 1994. Lecture Notes in Computer Science, vol 917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0000442

Download citation

Publish with us