Abstract
Interpolation attack was presented by Jakobsen and Knudsen at FSE’97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the \( \mathcal{P}\mathcal{U}\mathcal{R}\mathcal{E} \) cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that efficiently evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3–72, 1991. (The extended abstract was presented at CRYPTO’90).
Joan Daemen, Lars Ramkilde Knudsen, and Vincent Rijmen. The block cipher Square. In Eli Biham, editor, Fast Software Encryption — 4th International Workshop, FSE’97, volume 1267 of Lecture Notes in Computer Science, pages 54–68, Berlin, Heidelberg, New York, 1997. Springer-Verlag.
Joan Daemen and Vincent Rijmen. AES Proposal: Rijndael, 1998. (http://www.esat.kuleuven.ac.be/~rijmen/rijndael/).
Thomas Jakobsen and Lars Ramkilde Knudsen. The interpolation attack on block cipher. In Eli Biham, editor, Fast Software Encryption — 4th International Workshop, FSE’97, volume 1267 of Lecture Notes in Computer Science, pages 28–40, Berlin, Heidelberg, New York, 1997. Springer-Verlag.
Lars Ramkilde Knudsen. Truncated and higher order differentials. In Bart Preneel, editor, Fast Software Encryption — Second International Workshop, volume 1008 of Lecture Notes in Computer Science, pages 196–211. Springer-Verlag, Berlin, Heidelberg, New York, 1995.
Chang-Hyi Lee and Young-Tae Cha. The block cipher: SNAKE with provable resistance against DC and LC attacks. In 1997 Korea-Japan Joint Workshop on Information Security and Cryptology (JW-ISC’97), pages 3–17, Seoul, KOREA, 1997. KIISC (Korea) and ISEC Group of IEICE (Japan).
Chae Hoon Lim. CRYPTON: A New 128-bit Block Cipher — Specification and Analysis —. Future Systems, 1998. (http://www.crypt.future.co.kr/chilim/crypton.html).
Mitsuru Matsui. Linear cryptanalysis method for DES cipher. In Tor Helleseth, editor, Advances in Cryptology — EUROCRYPT’93, volume 765 of Lecture Notes in Computer Science, pages 386–397. Springer-Verlag, Berlin, Heidelberg, New York, 1994. (A preliminary version written in Japanese was presented at SCIS93-3C).
Shiho Moriai, Takeshi Shimoyama, and Toshinobu Kaneko. Higher order differential attack using chosen higher order differences. In Stafford Tavares and Henk Meijer, editors, Selected Areas in Cryptography — 5th Annual International Workshop, SAC’98, volume 1556 of Lecture Notes in Computer Science, pages 106–117, Berlin, Heidelberg, New York, 1999. Springer-Verlag.
Shiho Moriai, Takeshi Shimoyama, and Toshinobu Kaneko. Interpolation attacks of the block cipher: SNAKE. In Lars Ramkilde Knudsen, editor, Fast Software Encryption — 6th International Workshop, FSE’99, volume 1636 of Lecture Notes in Computer Science, pages 275–289, Berlin, Heidelberg, New York, 1999. Springer-Verlag. (A preliminary version written in Japanese was presented at SCIS’98-7.2.C).
Nippon Telegraph and Telephone Corporation. Specification of E2 — a 128-bit Block Cipher, 1998. (http://www.info.isl.ntt.co.jp/e2/).
Kaisa Nyberg. Differentially uniform mappings for cryptography. In Tor Helleseth, editor, Advances in Cryptology — EUROCRYPT’93, volume 765 of Lecture Notes in Computer Science, pages 55–64. Springer-Verlag, Berlin, Heidelberg, New York, 1994.
Kaisa Nyberg. Linear approximation of block ciphers. In Alfredo De Santis, editor, Advances in Cryptology — EUROCRYPT’94, volume 950 of Lecture Notes in Computer Science, pages 439–444. Springer-Verlag, Berlin, Heidelberg, New York, 1995.
Kaisa Nyberg and Lars Ramkilde Knudsen. Provable security against a differential attack. Journal of Cryptology, 8(1):27–37, 1995. (A preliminary version was presented at CRYPTO’92 rump session).
Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, and Erik DeWin. The cipher SHARK. In Dieter Gollmann, editor, Fast Software Encryption — Third International Workshop, volume 1039 of Lecture Notes in Computer Science, pages 99–111. Springer-Verlag, Berlin, Heidelberg, New York, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aoki, K. (2000). Efficient Evaluation of Security against Generalized Interpolation Attack. In: Heys, H., Adams, C. (eds) Selected Areas in Cryptography. SAC 1999. Lecture Notes in Computer Science, vol 1758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46513-8_10
Download citation
DOI: https://doi.org/10.1007/3-540-46513-8_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67185-5
Online ISBN: 978-3-540-46513-3
eBook Packages: Springer Book Archive