Linear cryptanalysis of the PP-1 and PP-2 block ciphers

0Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

PP-1 and PP-2 are scalable SPN-based block ciphers introduced in 2008 and 2013, respectively. PP-2 was intended as an improvement to PP-1, which was broken in 2011 using differential cryptanalysis. The designers of PP-2 claim that it is comparable to the Advanced Encryption Standard (AES) in its resistance to linear and differential cryptanalysis. However, we demonstrate that both PP-1 and PP-2 with 64-bit and 128-bit block sizes are vulnerable to linear cryptanalysis. Specifically, we find high probability linear hulls that allow us to break each cipher faster than exhaustive search of the keyspace. This is the first use of linear cryptanalysis against PP-1, and the first successful attack of any kind against PP-2. We confirm our theoretical results by experimentally breaking a reduced-round version of PP-2.

Cite

CITATION STYLE

APA

Colburn, M., & Keliher, L. (2014). Linear cryptanalysis of the PP-1 and PP-2 block ciphers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8885, pp. 107–123). Springer Verlag. https://doi.org/10.1007/978-3-319-13039-2_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free