Related Concepts
Definition
Differential–Linear attack is a chosen plaintext two-stage technique of cryptanalysis (by analogy with two-stage rocket technology) in which the first stage is covered by differential cryptanalysis, which ensures propagation of useful properties midway through the block cipher. The second stage is then performed from the middle of the cipher and to the ciphertext using linear cryptanalysis. The technique was discovered and demonstrated on the example of 8-round DES (Data Encryption Standard) by Langford and Hellman [ 4].
Theory
Given a differential characteristic with probability p for the rounds \(1,\ldots ,i\) and the linear characteristic with bias q for the rounds \(i + 1,\ldots ,\ R\), the bias of resulting linear approximation would be \(1/2 + 2{\mathit{pq}}^{2}\) and the data complexity of the attack will be \(O({p}^{-2}{q}^{-4})\) [3, p. 65]. Thus the attack would be useful only in special cases when...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Aoki K, Ohta K (1996) Differential-linear cryptanalysis of FEAL-8. IEICE Trans Fundamentals Electron Commun Comput Sci E79A (1):20–27
Biham E, Dunkelman O, Keller N (2002) Enhancing differential-linear cryptanalysis. In: Zheng Y (ed) Advances in cryptology asiacrypt 2002. Lecture notes in computer science, vol 2501. Springer, Berlin, pp 254–266
Langford SK (1995) Differential-linear cryptanalysis and threshold signatures. Technical report, PhD thesis, Stanford University
Langford SK, Hellman ME (1994) Differential–linear cryptanalysis. In: Desmedt Y (ed) Advances in cryptology – crypto’94. Lecture notes in computer science, vol 839. Springer, Berlin, pp 17–25
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Biryukov, A. (2011). Differential–Linear Attack. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_573
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_573
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering