Abstract
CS-Cipher is a block cipher which has been proposed at FSE 1998. It is a Markov cipher in which diffusion is performed by multiper-mutations. In this paper we first provide a formal treatment for differential, linear and truncated differential cryptanalysis, and we apply it to CS-Cipher in order to prove that there exists no good characteristic for these attacks. This holds under the approximation that all round keys of CS-Cipher are uniformly distributed and independent. For this we introduce some new technique for counting active Sboxes in computational networks by the Floyd-Warshall algorithm.
Chapter PDF
Similar content being viewed by others
References
FIPS 46, Data Encryption Standard. U.S. Department of Commerce-National Bureau of Standards, National Technical Information Service, Springfield, Virginia. Federal Information Processing Standard Publication 46, 1977.
CD-ROM “AES CD-1: Documentation”, National Institute of Standards and Technology (NIST), August 1998. Documentation for the First Advanced Encryption Standard Candidate Conference.
C. M. Adams. A Formal and Practical Design Procedure for Substitution-Permutation Network Cryptosystems., Ph.D. Thesis of Queen’s University, Kingston, Ontario, Canada, 1990.
C. M. Adams, S. E. Tavares. Designing s-boxes Resistant to Differential Cryptanalysis. In Proceedings of 3rd Symposium on the State and Progress of Research in Cryptography, pp. 386–397, Rome, Italy, 1994.
O. Baudron, H. Gilbert, L. Granboulan, H. Handschuh, R. Harley, A. Joux, P. Nguyen, F. Noilhan, D. Pointcheval, T. Pornin, G. Poupard, J. Stern, S. Vaudenay. DFC Update. In Proceedings from the Second Advanced Encryption Standard Candidate Conference, National Institute of Standards and Technology (NIST), March 1999.
E. Biham. On Matsui’s Linear Cryptanalysis. In Advances in Cryptology EUROCRYPT’94, Perugia, Italy, Lectures Notes in Computer Science 950, pp. 341–355, Springer-Verlag, 1995.
E. Biham, A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. In Advances in Cryptology CRYPTO’90, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 537, pp. 2–21, Springer-Verlag, 1991.
E. Biham, A. Shamir. Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
F. Chabaud, S. Vaudenay. Links Between Differential and Linear Cryptanalysis. In Advances in Cryptology EUROCRYPT’94, Perugia, Italy, Lectures Notes in Computer Science 950, pp. 356–365, Springer-Verlag, 1995.
T. H. Cormen, C. E. Leiserson, R. L. Rivest. Introduction to Algorithms, Mc Graw Hill, 1990.
J. Daemen. Cipher and Hash Function Design-Strategies based on Linear and Differential Cryptanalysis, Doctoral Dissertation, Katholieke Universiteit Leuven, 1995.
J. Daemen, L. R. Knudsen, V. Rijmen. The Block Cipher Square. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 149–165, Springer-Verlag, 1997.
H. Feistel. Cryptography and Computer Privacy. Scientific American, Vol. 228, pp. 15–23, 1973.
R. W. Floyd. Algorithm 97 (SHORTEST PATH). In Communications of the ACM, Vol. 5, p. 345, 1962.
H. Gilbert, M. Girault, P. Hoogvorst, F. Noilhan, T. Pornin, G. Poupard, J. Stern, S. Vaudenay. Decorrelated Fast Cipher: an AES Candidate. Submitted to the Advanced Encryption Standard process. In CD-ROM “AES CD-1: Documentation”, National Institute of Standards and Technology (NIST), August 1998.
H. M. Heys. The Design of Substitution-Permutation Network Ciphers Resistant to Cryptanalysis, Ph.D. Thesis of Queen’s University, Kingston, Ontario, Canada, 1994.
H. M. Heys, S. E. Tavares. Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. Journal of Cryptology, Vol. 9, pp. 1–19, 1996.
L. R. Knudsen. Truncated and Higher Order Differentials. In Fast Software Encryption, Leuven, Belgium, Lectures Notes in Computer Science 1008, pp. 196–211, Springer-Verlag, 1995.
L. R. Knudsen, T. A. Berson. Truncated Differentials of SAFER. In Fast Software Encryption, Cambridge, United Kingdom, Lectures Notes in Computer Science 1039, pp. 15–26, Springer-Verlag, 1996.
X. Lai. On the Design and Security of Block Ciphers, ETH Series in Information Processing, Vol. 1, Hartung-Gorre Verlag Konstanz, 1992.
X. Lai, J. L. Massey, S. Murphy. Markov Ciphers and Differential Cryptanalysis. In Advances in Cryptology EUROCRYPT’91, Brighton, United Kingdom, Lectures Notes in Computer Science 547, pp. 17–38, Springer-Verlag, 1991.
J. L. Massey. SAFER K-64: a Byte-Oriented Block-Ciphering Algorithm. In Fast Software Encryption, Cambridge, United Kingdom, Lectures Notes in Computer Science 809, pp. 1–17, Springer-Verlag, 1994.
M. Matsui. Linear Cryptanalysis Methods for DES Cipher. In Advances in Cryptology EUROCRYPT’93, Lofthus, Norway, Lectures Notes in Computer Science 765, pp. 386–397, Springer-Verlag, 1994.
M. Matsui. The First Experimental Cryptanalysis of the Data Encryption Standard. In Advances in Cryptology CRYPTO’94, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 839, pp. 1–11, Springer-Verlag, 1994.
M. Matsui. New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. In Fast Software Encryption, Cambridge, United Kingdom, Lectures Notes in Computer Science 1039, pp. 205–218, Springer-Verlag, 1996.
M. Matsui. New Block Encryption Algorithm MISTY. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 54–68, Springer-Verlag, 1997.
K. Nyberg. Perfect Nonlinear S-Boxes. In Advances in Cryptology EUROCRYPT’91, Brighton, United Kingdom, Lectures Notes in Computer Science 547, pp. 378–385, Springer-Verlag, 1991.
K. Nyberg. Differentially Uniform Mapping for Cryptography. In Advances in Cryptology EUROCRYPT’93, Lofthus, Norway, Lectures Notes in Computer Science 765, pp. 55–64, Springer-Verlag, 1994.
K. Nyberg. Linear Approximation of Block Ciphers. In Advances in Cryptology EUROCRYPT’94, Perugia, Italy, Lectures Notes in Computer Science 950, pp. 439–444, Springer-Verlag, 1995.
K. Nyberg, L. R. Knudsen. Provable Security against a Differential Cryptanalysis. In Advances in Cryptology CRYPTO’92, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 740, pp. 566–574, Springer-Verlag, 1993.
K. Nyberg, L. R. Knudsen. Provable Security against a Differential Cryptanalysis. Journal of Cryptology, Vol. 8, pp. 27–37, 1995.
J. Stern, S. Vaudenay. CS-Cipher. In Fast Software Encryption, Paris, France, Lectures Notes in Computer Science 1372, pp. 189–205, Springer-Verlag, 1998.
S. Vaudenay. On the Need for Multipermutations: Cryptanalysis of MD4 and SA-FER. In Fast Software Encryption, Leuven, Belgium, Lectures Notes in Computer Science 1008, pp. 286–297, Springer-Verlag, 1995.
S. Vaudenay. La Sécurité des Primitives Cryptographiques, Thése de Doctorat de l’Université de Paris 7, Technical Report LIENS-95-10 of the Laboratoire d’Informatique de l’Ecole Normale Supérieure, 1995.
S. Vaudenay. A cheap Paradigm for Block Cipher Security Strengthening. Technical Report LIENS-97-3, 1997.
S. Vaudenay. Provable Security for Block Ciphers by Decorrelation. In STACS 98, Paris, France, Lectures Notes in Computer Science 1373, pp. 249–275, Springer-Verlag, 1998.
S. Vaudenay. Feistel Ciphers with L2-Decorrelation. To appear in SAC’98, LNCS.
S. Vaudenay. The Decorrelation Technique Home-Page. URL:http://www.dmi.ens.fr/~vaudenay/decorrelation.html
S. Vaudenay. Resistance Against General Iterated Attacks. (To appear in Eurocrypt’ 99.)
A. M. Youssef, S. Mister, S. E. Tavares. On the Design of Linear Transformations for Substitution Permutation Encryption Networks. Presented at SAC’97.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vaudenay, S. (1999). On the Security of CS-Cipher. In: Knudsen, L. (eds) Fast Software Encryption. FSE 1999. Lecture Notes in Computer Science, vol 1636. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48519-8_19
Download citation
DOI: https://doi.org/10.1007/3-540-48519-8_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66226-6
Online ISBN: 978-3-540-48519-3
eBook Packages: Springer Book Archive