Home Methods of linear and differential relations in cryptography
Article
Licensed
Unlicensed Requires Authentication

Methods of linear and differential relations in cryptography

  • Fedor M. Malyshev EMAIL logo
Published/Copyright: July 13, 2024

Abstract

The paper studies mappings F of binary vector spaces of large dimensions. The mappings are assumed to be represented by deep branching superpositions of local non-linear mappings of low-dimensional spaces. We propose and investigate the methods for construction of probabilistic linear and differential relations connecting the arguments and the values of a mapping F. Relation selection is based on optimization not the exact probability of satisfying these relations, but some approximation of it since it is easier to estimate. We prove theorems on exact values of the probability of satisfying the relations obtained, identify the shortcomings and features of the proposed approach to the relation construction and illustrate them by a number of examples. We discuss the role of the developed theory for cryptographic synthesis.


Originally published in Diskretnaya Matematika (2022) 34, №1, 36–63 (in Russian).


References

[1] Erokhin A. V., Malyshev F. M., Trishin A. E., “Multidimensional linear method and diffusion characteristics of linear medium of ciphering transform”, Matematicheskie voprosy kriptografii, 8:4 (2017), 29–62 (in Russian).Search in Google Scholar

[2] Malyshev F. M., “The duality of differential and linear methods in cryptography”, Matematicheskie voprosy kriptografii, 5:3 (2014), 29–74 (in Russian).Search in Google Scholar

[3] Malyshev F. M., “On affine classification of permutations on the space GF(2)3”, Discrete Math. Appl., 29:6 (2019), 363–371.Search in Google Scholar

[4] Malyshev F. M., “Differential characteristics of element additions in GF(2)n on mod 2 and on mod 2n”, Algebra, teoriya chisel i diskretnaya geometriya: sovremennye problemy, prilozheniya i problemy istorii, Mater. XVI mezhdunar. konf. (TGPU im. L. N. Tolstogo, Tula), 2019, 175–179 (in Russian).Search in Google Scholar

[5] Malyshev F. M., “Probabilistic characteristics of differential and linear relations for nonhomogeneous linear medium”, Matematicheskie voprosy kriptografii, 10:1 (2019), 41–72 (in Russian).Search in Google Scholar

[6] Malyshev F. M., “Functional circuits defining families of permutations of the space GF(2)N”, Matematicheskie voprosy kriptografii, 10:3 (2019), 81–87 (in Russian).Search in Google Scholar

[7] Malyshev F. M., “Differential characteristics of base operations in ARX-ciphers”, Matematicheskie voprosy kriptografii, 11:4 (2020), 97–105 (in Russian).Search in Google Scholar

[8] Malyshev F. M., Trifonov D. I., “Diffusion properties of XSLP-ciphers”, Matematicheskie voprosy kriptografii, 7:3 (2016), 47–60 (in Russian).Search in Google Scholar

[9] Malyshev F. M., Trishin A. E., “Linear and differential methods in cryptography (another view)”, Algebra, teoriya chisel i diskretnaya geometriya: sovremennye problemy, prilozheniya i problemy istorii, Mater. XV mezhdunar. konf. (TGPU im. L. N. Tolstogo, Tula), 2018,42–45 (in Russian).Search in Google Scholar

[10] Massey J. L., “An introduction to contemporary cryptology”, Proc. IEEE, 76:5 (1988), 533–549.Search in Google Scholar

[11] Fedchenko V. A., “Diffusion rates of linear medium in AES-like ciphers”, Matematicheskie voprosy kriptografii, 8:3 (2017), 109–126 (in Russian).Search in Google Scholar

[12] Fedchenko V. A., “Minimal consistent systems of local probabilistic relations for AES-like ciphers”, Matematicheskie voprosy kriptografii, 9:3 (2018), 127–142 (in Russian).Search in Google Scholar

[13] Fedchenko V. A., “On the linear and differential cryptanalysis of the AES-like ciphers”, Matematicheskie voprosy kriptografii, 11:3 (2020), 101–120 (in Russian).Search in Google Scholar

[14] Feller W., An introduction to probability theory and its applications, 1, 2nd ed., Wiley, New York, 1957, 461 pp.Search in Google Scholar

[15] Shannon C. E., “Communication Theory of Secrecy Systems”, Bell Syst. Tech. J., 28:4 (1949), 656–715.Search in Google Scholar

[16] Daemen J., Govaerts R., Vandewalle J., “Correlation matrices”, FSE 1994, Lect. Notes Comput. Sci., 1008, 1995, 275–285.Search in Google Scholar

[17] Daemen J., Rijmen V, The Design of Rijndael: AES — The Advanced Encryption Standard, Springer, Berlin, Heidelberg, 2002, 238 pp.Search in Google Scholar

[18] Malyshev F. M., Trishin A. E., “Linear and differential cryptanalysis: Another viewpoint”, Matematicheskie voprosy kriptografii, 11:2 (2020), 83–98.Search in Google Scholar

Received: 2021-03-11
Published Online: 2024-07-13
Published in Print: 2024-06-25

© 2024 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 4.11.2025 from https://www.degruyterbrill.com/document/doi/10.1515/dma-2024-0012/html
Scroll to top button