Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Differential–Linear Attack

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 273 Accesses

Differential–Linear attack is a chosen plaintext two-stage technique of cryptanalysis (by analogy with two-stage rocket technology) in which the first stage is covered by differential cryptanalysis, which ensures propagation of useful properties midway through the block cipher. The second stage is then performed from the middle of the cipher and to the ciphertext using linear cryptanalysis. The technique was discovered and demonstrated on the example of 8-round DES (see Data Encryption Standard) by Langford and Hellman [4]. Given a differential characteristic with probability p for the rounds \(1,\ldots, i\) and the linear characteristic with bias q for the rounds \(i+1,\ldots, R\), the bias of resulting linear approximation would be \(1/2+2pq^{2}\) and the data complexity of the attack will be \(O(p^{-2}q^{-4})\)[3, p. 65]. Thus the attack would be useful only in special cases when there are good characteristics or linear approximations half-way through the cipher, but no good...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Aoki, K. and K. Ohta (1996). “Differential-linear cryptanalysis of FEAL-8.” IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, E79A (1), 20–27.

    Google Scholar 

  2. Eli Biham, Orr Dunkelman, and Nathan Keller, “Enhancing Differential-Linear Cryptanalysis", Advances in Cryptology ASIACRYPT 2002, Lecture Notes in Computer Science, vol. 2501, ed. Y. Zheng. Springer-Verlag, Berlin, p. 254–266.

    Google Scholar 

  3. Langford, S.K. (1995). “Differential-linear cryptanalysis and threshold signatures.” Technical report, PhD Thesis, Stanford University.

    Google Scholar 

  4. Langford, S.K. and M.E. Hellman (1994). “Differential–linear cryptanalysis.” Advances in Cryptology—CRYPTO'94. Lecture Notes in Computer Science, vol. 839, ed. Y. Desmedt. Springer-Verlag, Berlin, 17–25.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Biryukov, A. (2005). Differential–Linear Attack. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_109

Download citation

Publish with us

Policies and ethics