Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis

Jaechul Sung, Sangjin Lee, Jongin Lim, Seokhie Hong, Sangjoon Park

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Scopus citations

Abstract

In this paper we introduce a structure iterated by the rule A of Skipjack and show that this structure is provably resistant against differential or linear attacks. It is the main result of this paper that the upper bound of r-round (r ≥ 15) differential(or linear hull) probabilities are bounded by p4 if the maximum differential (or linear hull) probability of a round function is p, and an impossible differential of this structure does not exist if r ≥ 16. Application of this structure which can be seen as a generalized Feistel structure in a way to block cipher designs brings out the provable security against differential and linear attacks with some upper bounds of probabilities. We also propose an interesting conjecture.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsTatsuaki Okamoto
PublisherSpringer Verlag
Pages274-288
Number of pages15
ISBN (Electronic)3540414045, 9783540414049
DOIs
StatePublished - 2000
Event6th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2000 - Kyoto, Japan
Duration: 3 Dec 20007 Dec 2000

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1976
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2000
Country/TerritoryJapan
CityKyoto
Period3/12/007/12/00

Fingerprint

Dive into the research topics of 'Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis'. Together they form a unique fingerprint.

Cite this