Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates

Christoph Erwin Dobraunig, Maria Eichlseder, Florian Mendel

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Differential and linear cryptanalysis are the general purpose tools to analyze various cryptographic primitives. Both techniques have in common that they rely on the existence of good differential or linear characteristics. The difficulty of finding such characteristics depends on the primitive. For instance, AES is designed to be resistant against differential and linear attacks and therefore, provides upper bounds on the probability of possible linear characteristics. On the other hand, we have primitives like SHA-1, SHA-2, and Keccak, where finding good and useful characteristics is an open problem. This becomes particularly interesting when considering, for example, competitions like CAESAR. In such competitions, many cryptographic primitives are waiting for analysis. Without suitable automatic tools, this is a virtually infeasible job. In recent years, various tools have been introduced to search for characteristics. The majority of these only deal with differential characteristics. In this work, we present a heuristic search tool which is capable of finding linear characteristics even for primitives with a relatively large state, and without a strongly aligned structure. As a proof of concept, we apply the presented tool on the underlying permutations of the first round CAESAR candidates Ascon, ICEPOLE, Keyak, Minalpher and Prøst.
Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2015
Place of PublicationCham
PublisherSpringer
Pages490-509
ISBN (Print)978-3-662-48799-0
DOIs
Publication statusPublished - 2015
Event2015 International Conference on the Theory and Application of Cryptology and Information Security: ASIACRYPT 2015 - Auckland, New Zealand
Duration: 29 Nov 20153 Dec 2015

Publication series

Name Lecture Notes in Computer Science
PublisherSpringer
Volume9453

Conference

Conference2015 International Conference on the Theory and Application of Cryptology and Information Security
Abbreviated titleASIACRYPT 2015
Country/TerritoryNew Zealand
CityAuckland
Period29/11/153/12/15

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Basic - Fundamental (Grundlagenforschung)

Fingerprint

Dive into the research topics of 'Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates'. Together they form a unique fingerprint.

Cite this