Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis

As two important cryptanalytic methods, impossible differential and integral cryptanalysis have attracted much attention in recent years. Although relations among other cryptanalytic approaches have been investigated, the link between these two methods has been missing. The motivation in this paper is to fix this gap and establish links between impossible differential cryptanalysis and integral cryptanalysis.

[1]  David A. Wagner,et al.  The Boomerang Attack , 1999, FSE.

[2]  Vincent Rijmen,et al.  The Block Cipher Square , 1997, FSE.

[3]  Vincent Rijmen,et al.  Linear hulls with correlation zero and linear cryptanalysis of block ciphers , 2014, Des. Codes Cryptogr..

[4]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .

[5]  Stefan Lucks The Saturation Attack - A Bait for Twofish , 2000, FSE.

[6]  Jongsung Kim,et al.  Impossible Differential Cryptanalysis for Block Cipher Structures , 2003, INDOCRYPT.

[7]  Dengguo Feng,et al.  Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers , 2012, ACNS.

[8]  Andrey Bogdanov,et al.  On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers , 2014, ACNS.

[9]  Eli Biham,et al.  Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials , 1999, Journal of Cryptology.

[10]  David A. Wagner,et al.  Integral Cryptanalysis , 2002, FSE.

[11]  Fang-Hsuan Cheng,et al.  The Block Cipher: SEA2 With Provable Resistance Against DC and LC Attacks , 2000, J. Inf. Sci. Eng..

[12]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[13]  Mingsheng Wang,et al.  Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers , 2012, INDOCRYPT.

[14]  Gregor Leander,et al.  Differential-Linear Cryptanalysis Revisited , 2014, FSE.

[15]  Alex Biryukov,et al.  Structural Cryptanalysis of SASAS , 2001, Journal of Cryptology.

[16]  Changhui Hu,et al.  New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 , 2008, Selected Areas in Cryptography.

[17]  Dengguo Feng,et al.  Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia , 2007, Journal of Computer Science and Technology.

[18]  Guang Gong,et al.  A unified method for finding impossible differentials of block cipher structures , 2014, Inf. Sci..

[19]  Yosuke Todo,et al.  Structural Evaluation by Generalized Integral Property , 2015, EUROCRYPT.

[20]  Chao Li,et al.  SQUARE attack on block ciphers with low algebraic degree , 2010, Science China Information Sciences.

[21]  Andrey Bogdanov,et al.  Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA , 2013, Selected Areas in Cryptography.

[22]  Chao Li,et al.  New Observation on Camellia , 2005, Selected Areas in Cryptography.

[23]  Mitsuru Matsui,et al.  Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis , 2000, Selected Areas in Cryptography.

[24]  Claude Carlet,et al.  Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.

[25]  Jongsung Kim,et al.  Impossible differential cryptanalysis using matrix method , 2010, Discret. Math..

[26]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[27]  Kaisa Nyberg,et al.  New Links Between Differential and Linear Cryptanalysis , 2015, IACR Cryptol. ePrint Arch..

[28]  Serge Vaudenay,et al.  Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.

[29]  Thierry P. Berger,et al.  Extended Generalized Feistel Networks Using Matrix Representation , 2013, Selected Areas in Cryptography.

[30]  J. Massey,et al.  Communications and Cryptography: Two Sides of One Tapestry , 1994 .

[31]  Toshinobu Kaneko,et al.  Interpolation Attacks of the Block Cipher: SNAKE , 1999, FSE.

[32]  Gregor Leander,et al.  On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN , 2011, EUROCRYPT.

[33]  Anne Canteaut,et al.  PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract , 2012, ASIACRYPT.

[34]  Kaisa Nyberg,et al.  Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities , 2014, IACR Cryptol. ePrint Arch..

[35]  Lejla Batina,et al.  S-box, SET, Match: A Toolbox for S-box Analysis , 2014, WISTP.

[36]  Vincent Rijmen,et al.  Improved Impossible Differential Cryptanalysis of 7-Round AES-128 , 2010, INDOCRYPT.

[37]  Daesung Kwon,et al.  New Block Cipher: ARIA , 2003, ICISC.

[38]  Andrey Bogdanov,et al.  Integral and Multidimensional Linear Distinguishers with Correlation Zero , 2012, ASIACRYPT.