Rigorous upper bounds on data complexities of block cipher cryptanalysis
Statistical analysis of symmetric key attacks aims to obtain an expression for the data complexity which is the number of plaintext-ciphertext pairs needed to achieve the parameters of the attack. Existing statistical analyses invariably use some kind of approximation, the most common being the appr...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2017-10-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2016-0026 |
id |
doaj-5fba65e1ba3b4ef19f8733f17445e01c |
---|---|
record_format |
Article |
spelling |
doaj-5fba65e1ba3b4ef19f8733f17445e01c2021-09-06T19:40:44ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842017-10-0111314717510.1515/jmc-2016-0026Rigorous upper bounds on data complexities of block cipher cryptanalysisSamajder Subhabrata0Sarkar Palash1Applied Statistics Unit, Indian Statistical Institute, 203, B.T. Road, 700108Kolkata, IndiaApplied Statistics Unit, Indian Statistical Institute, 203, B.T. Road, 700108Kolkata, IndiaStatistical analysis of symmetric key attacks aims to obtain an expression for the data complexity which is the number of plaintext-ciphertext pairs needed to achieve the parameters of the attack. Existing statistical analyses invariably use some kind of approximation, the most common being the approximation of the distribution of a sum of random variables by a normal distribution. Such an approach leads to expressions for data complexities which are inherently approximate. Prior works do not provide any analysis of the error involved in such approximations. In contrast, this paper takes a rigorous approach to analyzing attacks on block ciphers. In particular, no approximations are used. Expressions for upper bounds on the data complexities of several basic and advanced attacks are obtained. The analysis is based on the hypothesis testing framework. Probabilities of type-I and type-II errors are upper bounded by using standard tail inequalities. In the cases of single linear and differential cryptanalysis, we use the Chernoff bound. For the cases of multiple linear and multiple differential cryptanalysis, Hoeffding bounds are used. This allows bounding the error probabilities and obtaining expressions for data complexities. We believe that our method provides important results for the attacks considered here and more generally, the techniques that we develop should have much wider applicability.https://doi.org/10.1515/jmc-2016-0026block cipherlinear cryptanalysisdifferential cryptanalysislog-likelihood ratio testhypothesis testingchernoff boundhoeffding’s inequality94a60 11t71 68p25 62p99 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Samajder Subhabrata Sarkar Palash |
spellingShingle |
Samajder Subhabrata Sarkar Palash Rigorous upper bounds on data complexities of block cipher cryptanalysis Journal of Mathematical Cryptology block cipher linear cryptanalysis differential cryptanalysis log-likelihood ratio test hypothesis testing chernoff bound hoeffding’s inequality 94a60 11t71 68p25 62p99 |
author_facet |
Samajder Subhabrata Sarkar Palash |
author_sort |
Samajder Subhabrata |
title |
Rigorous upper bounds on data complexities of block cipher cryptanalysis |
title_short |
Rigorous upper bounds on data complexities of block cipher cryptanalysis |
title_full |
Rigorous upper bounds on data complexities of block cipher cryptanalysis |
title_fullStr |
Rigorous upper bounds on data complexities of block cipher cryptanalysis |
title_full_unstemmed |
Rigorous upper bounds on data complexities of block cipher cryptanalysis |
title_sort |
rigorous upper bounds on data complexities of block cipher cryptanalysis |
publisher |
De Gruyter |
series |
Journal of Mathematical Cryptology |
issn |
1862-2976 1862-2984 |
publishDate |
2017-10-01 |
description |
Statistical analysis of symmetric key attacks aims to obtain an expression for the data complexity which is the number of plaintext-ciphertext pairs needed to achieve the parameters of the attack.
Existing statistical analyses invariably use some kind of approximation, the most common being the approximation of the distribution of a sum of random variables by a normal distribution.
Such an approach leads to expressions for data complexities which are inherently approximate.
Prior works do not provide any analysis of the error involved in such approximations.
In contrast, this paper takes a rigorous approach to analyzing attacks on block ciphers.
In particular, no approximations are used. Expressions for upper bounds on the data complexities of several basic and advanced attacks are obtained.
The analysis is based on the hypothesis testing framework. Probabilities of type-I and type-II errors are upper bounded by using standard tail inequalities.
In the cases of single linear and differential cryptanalysis, we use the Chernoff bound.
For the cases of multiple linear and multiple differential cryptanalysis, Hoeffding bounds are used.
This allows bounding the error probabilities and obtaining expressions for data complexities.
We believe that our method provides important results for the attacks considered here and more generally, the techniques that we develop should have much wider applicability. |
topic |
block cipher linear cryptanalysis differential cryptanalysis log-likelihood ratio test hypothesis testing chernoff bound hoeffding’s inequality 94a60 11t71 68p25 62p99 |
url |
https://doi.org/10.1515/jmc-2016-0026 |
work_keys_str_mv |
AT samajdersubhabrata rigorousupperboundsondatacomplexitiesofblockciphercryptanalysis AT sarkarpalash rigorousupperboundsondatacomplexitiesofblockciphercryptanalysis |
_version_ |
1717767901651402752 |