On the distribution of linear biases: Three instructive examples

Mohamed Ahmed Abdelraheem, Peter Beelen, Gregor Leander, Martin Ågren

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    Despite the fact that we evidently have very good block ciphers at hand today, some fundamental questions on their security are still unsolved. One such fundamental problem is to precisely assess the security of a given block cipher with respect to linear cryptanalysis. In by far most of the cases we have to make (clearly wrong) assumptions, e.g., assume independent round-keys. Besides being unsatisfactory from a scientific perspective, the lack of fundamental understanding might have an impact on the performance of the ciphers we use. As we do not understand the security sufficiently enough, we often tend to embed a security margin - from an efficiency perspective nothing else than wasted performance. The aim of this paper is to stimulate research on these foundations of block ciphers. We do this by presenting three examples of ciphers that behave differently to what is normally assumed. Thus, on the one hand these examples serve as counter examples to common beliefs and on the other hand serve as a guideline for future work. © 2012 International Association for Cryptologic Research.
    Original languageEnglish
    Title of host publicationAdvances in Cryptology – CRYPTO 2012 : 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
    Volume7417
    PublisherSpringer
    Publication date2012
    Pages50-67
    ISBN (Print)978-3-642-32008-8
    ISBN (Electronic)978-3-642-32009-5
    DOIs
    Publication statusPublished - 2012
    Event32nd Annual Cryptology Conference - Santa Barbara, United States
    Duration: 19 Aug 201223 Dec 2012

    Conference

    Conference32nd Annual Cryptology Conference
    Country/TerritoryUnited States
    CitySanta Barbara
    Period19/08/201223/12/2012
    SeriesLecture Notes in Computer Science
    Volume7417

    Keywords

    • Lyapunov methods
    • Security of data
    • Cryptography

    Fingerprint

    Dive into the research topics of 'On the distribution of linear biases: Three instructive examples'. Together they form a unique fingerprint.

    Cite this