Skip to main content

Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers

  • Conference paper
  • First Online:
Progress in Cryptology -- INDOCRYPT 2014 (INDOCRYPT 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8885))

Included in the following conference series:

  • 1081 Accesses

Abstract

PP-1 and PP-2 are scalable SPN-based block ciphers introduced in 2008 and 2013, respectively. PP-2 was intended as an improvement to PP-1, which was broken in 2011 using differential cryptanalysis. The designers of PP-2 claim that it is comparable to the Advanced Encryption Standard (AES) in its resistance to linear and differential cryptanalysis. However, we demonstrate that both PP-1 and PP-2 with 64-bit and 128-bit block sizes are vulnerable to linear cryptanalysis. Specifically, we find high probability linear hulls that allow us to break each cipher faster than exhaustive search of the keyspace. This is the first use of linear cryptanalysis against PP-1, and the first successful attack of any kind against PP-2. We confirm our theoretical results by experimentally breaking a reduced-round version of PP-2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  2. Bogdanov, A., Tischhauser, E.: On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 19–38. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  3. Bucholc, K., Chmiel, K., Grocholewska-Czurylo, A., Stoklosa, J.: PP-2 Block Cipher. In: 7th International Conference on Emerging Security Information Systems and Technologies (SECURWARE 2013), pp. 162–168. XPS Press, Wilmington (2013)

    Google Scholar 

  4. Chmiel, K., Grocholewska-Czurylo, A., Stoklosa, J.: Involutional Block Cipher for Limited Resources. In: IEEE Global Telecommunications Conference (GLOBECOM 2008). IEEE Press (2008)

    Google Scholar 

  5. Daemen, J., Rijmen, V.: The Design of Rijndael: AES–The Advanced Encryption Standard. Springer, Heidelberg (2002)

    Book  Google Scholar 

  6. Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D., Cho, I.: Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 273–283. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Keliher, L., Meijer, H., Tavares, S.: High Probability Linear Hulls in Q. In: Preneel, B., et al. (eds.) Final Report of European Project IST-1999-12324: New European Schemes for Signatures, Integrity, and Encryption (NESSIE), pp. 749–761 (2004)

    Google Scholar 

  8. Keliher, L., Sui, J.: Exact Maximum Expected Differential and Linear Probability for Two-Round Advanced Encryption Standard. IET Information Security 1(2), 53–57 (2007)

    Article  Google Scholar 

  9. Lee, Y., Jeong, K., Sung, J., Lee, C., Hong, S., Chang, K.-Y.: Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks. Int. J. Distr. Sens. Net. 2013, 1–9 (2013)

    Google Scholar 

  10. Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  11. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  12. Misztal, M.: Differential Cryptanalysis of PP-1 Cipher. Annales UMCS Informatica AI XI 2, 9–24 (2011)

    Google Scholar 

  13. Misztal, M., Courtois, N.T.: Aggregated Differentials and Cryptanalysis of PP-1 and GOST. Periodica Mathematica Hungarica 65(2), 177–192 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  14. Nyberg, K.: Linear Approximation of Block Ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 439–444. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  15. Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Chapman & Hall/CRC, Boca Raton (2006)

    Google Scholar 

  16. Wallén, J.: Linear Approximations of Addition Modulo 2\(^{n}\). In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 261–273. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liam Keliher .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Colburn, M., Keliher, L. (2014). Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers. In: Meier, W., Mukhopadhyay, D. (eds) Progress in Cryptology -- INDOCRYPT 2014. INDOCRYPT 2014. Lecture Notes in Computer Science(), vol 8885. Springer, Cham. https://doi.org/10.1007/978-3-319-13039-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13039-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13038-5

  • Online ISBN: 978-3-319-13039-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics