Differential–Linear attack is a chosen plaintext two-stage technique of cryptanalysis (by analogy with two-stage rocket technology) in which the first stage is covered by differential cryptanalysis, which ensures propagation of useful properties midway through the block cipher. The second stage is then performed from the middle of the cipher and to the ciphertext using linear cryptanalysis. The technique was discovered and demonstrated on the example of 8-round DES (see Data Encryption Standard) by Langford and Hellman [4]. Given a differential characteristic with probability p for the rounds \(1,\ldots, i\) and the linear characteristic with bias q for the rounds \(i+1,\ldots, R\), the bias of resulting linear approximation would be \(1/2+2pq^{2}\) and the data complexity of the attack will be \(O(p^{-2}q^{-4})\)[3, p. 65]. Thus the attack would be useful only in special cases when there are good characteristics or linear approximations half-way through the cipher, but no good...
References
Aoki, K. and K. Ohta (1996). “Differential-linear cryptanalysis of FEAL-8.” IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, E79A (1), 20–27.
Eli Biham, Orr Dunkelman, and Nathan Keller, “Enhancing Differential-Linear Cryptanalysis", Advances in Cryptology ASIACRYPT 2002, Lecture Notes in Computer Science, vol. 2501, ed. Y. Zheng. Springer-Verlag, Berlin, p. 254–266.
Langford, S.K. (1995). “Differential-linear cryptanalysis and threshold signatures.” Technical report, PhD Thesis, Stanford University.
Langford, S.K. and M.E. Hellman (1994). “Differential–linear cryptanalysis.” Advances in Cryptology—CRYPTO'94. Lecture Notes in Computer Science, vol. 839, ed. Y. Desmedt. Springer-Verlag, Berlin, 17–25.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Biryukov, A. (2005). Differential–Linear Attack. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_109
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_109
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering