TY - GEN
T1 - Improving the algorithm 2 in multidimensional linear cryptanalysis
AU - Nguyen, Phuong Ha
AU - Wu, Hongjun
AU - Wang, Huaxiong
PY - 2011
Y1 - 2011
N2 - In FSE'09 Hermelin et al. introduced the Algorithm 2 of multidimensional linear cryptanalysis. If this algorithm is m-dimensional and reveals l bits of the last round key with N plaintext-ciphertext pairs, then its time complexity is O(mN2l). In this paper, we show that by applying the Fast Fourier Transform and Fast Walsh Hadamard Transform to the Algorithm 2 of multidimensional linear cryptanalysis, we can reduce the time complexity of the attack to O(N + λ2m+l), where λ is 3(m + l) or 4m + 3l . The resulting attacks are the best known key recovery attacks on 11-round and 12-round Serpent. The data, time, and memory complexity of the previously best known attack on 12-round Serpent are reduced by factor of 27.5, 211.7, and 27.5, respectively. This paper also simulates the experiments of the improved Algorithm 2 in multidimensional linear cryptanalysis on 5-round Serpent.
AB - In FSE'09 Hermelin et al. introduced the Algorithm 2 of multidimensional linear cryptanalysis. If this algorithm is m-dimensional and reveals l bits of the last round key with N plaintext-ciphertext pairs, then its time complexity is O(mN2l). In this paper, we show that by applying the Fast Fourier Transform and Fast Walsh Hadamard Transform to the Algorithm 2 of multidimensional linear cryptanalysis, we can reduce the time complexity of the attack to O(N + λ2m+l), where λ is 3(m + l) or 4m + 3l . The resulting attacks are the best known key recovery attacks on 11-round and 12-round Serpent. The data, time, and memory complexity of the previously best known attack on 12-round Serpent are reduced by factor of 27.5, 211.7, and 27.5, respectively. This paper also simulates the experiments of the improved Algorithm 2 in multidimensional linear cryptanalysis on 5-round Serpent.
KW - multidimensional linear cryptanalysis
KW - linear cryptanalysis
KW - serpent
KW - Fast Fourier Transform
KW - Fast Walsh Hadamard Transform
UR - http://www.scopus.com/inward/record.url?scp=79960242173&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-22497-3_5
DO - 10.1007/978-3-642-22497-3_5
M3 - Conference proceeding contribution
AN - SCOPUS:79960242173
SN - 9783642224966
T3 - Lecture Notes in Computer Science
SP - 61
EP - 74
BT - Information Security and Privacy
A2 - Parampalli, Udaya
A2 - Hawkes, Philip
PB - Springer, Springer Nature
CY - Heidelberg
T2 - 16th Australasian Conference on Information Security and Privacy, ACISP 2011
Y2 - 11 July 2011 through 13 July 2011
ER -