An algorithm to analyze substitution permutation network resistance to linear and differential cryptanalysis

Ali, Kashif (2007) An algorithm to analyze substitution permutation network resistance to linear and differential cryptanalysis. Masters thesis, Memorial University of Newfoundland.

[img] [English] PDF - Accepted Version
Available under License - The author retains copyright ownership and moral rights in this thesis. Neither the thesis nor substantial extracts from it may be printed or otherwise reproduced without the author's permission.

Download (48MB)


In this thesis, we propose a practical novel algorithm, called the Two-Round Iterative (TRI) algorithm that analyzes the block cipher structure referred to as a Substitution Permutation Network (SPN). The algorithm characterizes the resistance of the cipher to linear cryptanalysis and differential cryptanalysis. By finding the best of close to best linear approximation and differential characteristics of the cipher, the algorithm can be used to find the number of plaintext/ciphertext pairs required to mount either attack on the cipher successfully. An important feature of the algorithm is that the complexity of algorithm is linear in terms of number of rounds and hence is able to give results in practical time. -- In this thesis, the algorithm has been applied to 16-bit ciphers to verify the effectiveness of the algorithm in finding optimal linear biases and differential probabilities. Further, it is applied to realistic 64-bit ciphers based on 8X8 and 4X4 S-boxes that possess good cryptographic properties. In addition to the TRI algorithm, we have also developed two algorithms that are guaranteed to find the optimal linear approximation and differential characteristic and applied them to 16-bit ciphers in order to examine the TRI algorithm efficiency and effectiveness. It is shown that the TRI algorithm is effective in finding the best or close to the best linear approximation and differential characteristic and the corresponding linear bias and differential probability. Also the TRI algorithm can be practically applied to realistically sized cipher (e.g. 64-bits) where the other algorithms are too inefficient to be practical. Experimental data is presented in the form of figures and tables which demonstrate the usefulness of the TRI algorithm in characterizing the security level of realistic SPN block ciphers.

Item Type: Thesis (Masters)
Item ID: 10068
Additional Information: Includes bibliographical references (leaves 107-109).
Department(s): Engineering and Applied Science, Faculty of
Date: 2007
Date Type: Submission
Library of Congress Subject Heading: Ciphers--Design; Cryptography.

Actions (login required)

View Item View Item


Downloads per month over the past year

View more statistics