Skip to main content

Differential–Linear Attack

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 229 Accesses

Related Concepts

Block Ciphers; Data Encryption Standard (DES)

Definition

Differential–Linear attack is a chosen plaintext two-stage technique of cryptanalysis (by analogy with two-stage rocket technology) in which the first stage is covered by differential cryptanalysis, which ensures propagation of useful properties midway through the block cipher. The second stage is then performed from the middle of the cipher and to the ciphertext using linear cryptanalysis. The technique was discovered and demonstrated on the example of 8-round DES (Data Encryption Standard) by Langford and Hellman [ 4].

Theory

Given a differential characteristic with probability p for the rounds \(1,\ldots ,i\) and the linear characteristic with bias q for the rounds \(i + 1,\ldots ,\ R\), the bias of resulting linear approximation would be \(1/2 + 2{\mathit{pq}}^{2}\) and the data complexity of the attack will be \(O({p}^{-2}{q}^{-4})\) [3, p. 65]. Thus the attack would be useful only in special cases when...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Aoki K, Ohta K (1996) Differential-linear cryptanalysis of FEAL-8. IEICE Trans Fundamentals Electron Commun Comput Sci E79A (1):20–27

    Google Scholar 

  2. Biham E, Dunkelman O, Keller N (2002) Enhancing differential-linear cryptanalysis. In: Zheng Y (ed) Advances in cryptology asiacrypt 2002. Lecture notes in computer science, vol 2501. Springer, Berlin, pp 254–266

    Google Scholar 

  3. Langford SK (1995) Differential-linear cryptanalysis and threshold signatures. Technical report, PhD thesis, Stanford University

    Google Scholar 

  4. Langford SK, Hellman ME (1994) Differential–linear cryptanalysis. In: Desmedt Y (ed) Advances in cryptology – crypto’94. Lecture notes in computer science, vol 839. Springer, Berlin, pp 17–25

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Biryukov, A. (2011). Differential–Linear Attack. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_573

Download citation

Publish with us

Policies and ethics