Abstract
PP-1 and PP-2 are scalable SPN-based block ciphers introduced in 2008 and 2013, respectively. PP-2 was intended as an improvement to PP-1, which was broken in 2011 using differential cryptanalysis. The designers of PP-2 claim that it is comparable to the Advanced Encryption Standard (AES) in its resistance to linear and differential cryptanalysis. However, we demonstrate that both PP-1 and PP-2 with 64-bit and 128-bit block sizes are vulnerable to linear cryptanalysis. Specifically, we find high probability linear hulls that allow us to break each cipher faster than exhaustive search of the keyspace. This is the first use of linear cryptanalysis against PP-1, and the first successful attack of any kind against PP-2. We confirm our theoretical results by experimentally breaking a reduced-round version of PP-2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)
Bogdanov, A., Tischhauser, E.: On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 19–38. Springer, Heidelberg (2014)
Bucholc, K., Chmiel, K., Grocholewska-Czurylo, A., Stoklosa, J.: PP-2 Block Cipher. In: 7th International Conference on Emerging Security Information Systems and Technologies (SECURWARE 2013), pp. 162–168. XPS Press, Wilmington (2013)
Chmiel, K., Grocholewska-Czurylo, A., Stoklosa, J.: Involutional Block Cipher for Limited Resources. In: IEEE Global Telecommunications Conference (GLOBECOM 2008). IEEE Press (2008)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES–The Advanced Encryption Standard. Springer, Heidelberg (2002)
Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D., Cho, I.: Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 273–283. Springer, Heidelberg (2001)
Keliher, L., Meijer, H., Tavares, S.: High Probability Linear Hulls in Q. In: Preneel, B., et al. (eds.) Final Report of European Project IST-1999-12324: New European Schemes for Signatures, Integrity, and Encryption (NESSIE), pp. 749–761 (2004)
Keliher, L., Sui, J.: Exact Maximum Expected Differential and Linear Probability for Two-Round Advanced Encryption Standard. IET Information Security 1(2), 53–57 (2007)
Lee, Y., Jeong, K., Sung, J., Lee, C., Hong, S., Chang, K.-Y.: Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks. Int. J. Distr. Sens. Net. 2013, 1–9 (2013)
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Misztal, M.: Differential Cryptanalysis of PP-1 Cipher. Annales UMCS Informatica AI XI 2, 9–24 (2011)
Misztal, M., Courtois, N.T.: Aggregated Differentials and Cryptanalysis of PP-1 and GOST. Periodica Mathematica Hungarica 65(2), 177–192 (2012)
Nyberg, K.: Linear Approximation of Block Ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 439–444. Springer, Heidelberg (1995)
Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Chapman & Hall/CRC, Boca Raton (2006)
Wallén, J.: Linear Approximations of Addition Modulo 2\(^{n}\). In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 261–273. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Colburn, M., Keliher, L. (2014). Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers. In: Meier, W., Mukhopadhyay, D. (eds) Progress in Cryptology -- INDOCRYPT 2014. INDOCRYPT 2014. Lecture Notes in Computer Science(), vol 8885. Springer, Cham. https://doi.org/10.1007/978-3-319-13039-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-13039-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13038-5
Online ISBN: 978-3-319-13039-2
eBook Packages: Computer ScienceComputer Science (R0)