Advertisement

Markov Ciphers and Differential Cryptanalysis

  • Xuejia Lai
  • James L. Massey
  • Sean Murphy
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 547)

Abstract

This paper considers the security of iterated block ciphers against the differential cryptanalysis introduced by Biham and Shamir. Differential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES)). It is shown that the success of such attacks on an r-round cipher depends on the existence of (r-1)-round differentials that have high probabilities, where an i-round differential is defined as a couple (α, β) such that a pair of distinct plaintexts with difference α can result in a pair of i-th round outputs that have difference β, for an appropriate notion of “difference”. The probabilities of such differentials can be used to determine a lower bound on the complexity of a differential cryptanalysis attack and to show when an r-round cipher is not vulnerable to such attacks. The concept of “Markov ciphers” is introduced for iterated ciphers because of its significance in differential cryptanalysis. If an iterated cipher is Markov and its round subkeys are independent, then the sequence of differences at each round output forms a Markov chain. It follows from a result of Biham and Shamir that DES is a Markov cipher. It is shown that, for the appropriate notion of “difference”, the Proposed Encryption Standard (PES) of Lai and Massey, which is an 8-round iterated cipher, is a Markov cipher, as are also the mini-version of PES with block length 8, 16 and 32 bits. It is shown that PES(8) and PES(16) are immune to differential cryptanalysis after sufficiently many rounds. A detailed cryptanalysis of the full-size PES is given and shows that the very plausibly most probable 7-round differential has a probability about 2−58. A differential cryptanalysis attack of PES(64) based on this differential is shown to require all 264 possible encryptions. This cryptanalysis of PES suggested a new design principle for Markov ciphers, viz., that their transition probability matrices should not be symmetric. A minor modification of PES, consistent with all the original design principles, is proposed that satisfies this new design criterion. This modified cipher, called Improved PES (IPES), is described and shown to be highly resistant to differential cryptanalysis.

References

  1. [1]
    E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems”, to appear in Journal of Cryptology, Vol.4, No.1, 1991.Google Scholar
  2. [2]
    X. Lai and J.L. Massey, “A Proposal for a New Block Encryption Standard”, Advances in Cryptology-EUROCRYPT’90, Springer-Verlag, Berlin 1991, pp. 389–404.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • Xuejia Lai
    • 1
  • James L. Massey
    • 1
  • Sean Murphy
    • 2
  1. 1.Institute for Signal and Information ProcessingSwiss Federal Institute of TechnologyZürichSwitzerland
  2. 2.Royal Holloway & Bedford New CollegeUniversity of LondonEgham, Surrey

Personalised recommendations