Advertisement

Linear cryptanalysis of NUSH block cipher

  • Wenling Wu
  • Dengguo Feng
Article

Abstract

NUSH is a block cipher as a candidate for NESSIE. NUSH is analyzed by linear crypt-analysis. The complexity δ=(ε, η) of the attack consists of data complexity ε and time complexity η. Three linear approximations are used to analyze NUSH with 64-bit block. When |K|=128 bits, the complexities of three attacks are (258, 2124), (260, 278) and (262, 255) respectively. When |K|=192 bits, the complexities of three attacks are (258, 2157) (260, 296) and (262, 258) respectively. When |K| =256 bits, the complexities of three attacks are (258, 2125), (260, 278) and (262, 253) respectively. Three linear approximations are used to analyze NUSH with 128-bit block. When |K|=128 bits, the complexities of three attacks are (2122, 295), (2124, 257) and (2126, 252) respectively. When |K|=192 bits, the complexities of three attacks are (2122, 2142), (2124, 275) and (2126, 258) respectively. When |K|=256 bits, the complexities of three attacks are (2122, 2168), (2124, 281) and (2126, 264) respectively. Two linear approximations are used to analyze NUSH with 256-bit block. When |K|=128 bits, the complexities of two attacks are (2252, 2122) and (2254, 2119) respectively. When |K|=192 bits, the complexities of two attacks are (2252, 2181) and (2254, 2177) respectively. When |K|=256 bits, the complexities of two attacks are (2252, 2240) and (2254, 2219) respectively. These results show that NUSH is not immune to linear cryptanalysis, and longer key cannot enhance the security of NUSH.

Keywords

block cipher linear cryptanalysis linear approximation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lebedev, A. N., Volchkov, A. A., NUSH, http://www.cryptonessie.org.Google Scholar
  2. 2.
    Mitsuru Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology-Eurocrypt '93, Berlin: Springer-Verlag, 1993, 386–397.Google Scholar

Copyright information

© Science in China Press 2002

Authors and Affiliations

  1. 1.State Key Laboratory of Information Security, Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.Engineering Research Center for Information Security TechnologyChinese Academy of SciencesBeijingChina

Personalised recommendations