Open In App

What Is Linear Cryptanalysis in Information Security?

Last Updated : 19 Jun, 2024
Comments
Improve
Suggest changes
Like Article
Like
Report

Linear Cryptanalysis in Information Security is a type of cryptanalysis that focuses on discovering affine approximations to cipher elements. Block and stream ciphers have both been the subject of attacks. Linear cryptanalysis is one of the two most common attacks against block ciphers, the other being differential cryptanalysis. Given a high probability approximation, the attacker uses the parity bits of known plaintexts and ciphertexts to estimate the secret key's parity bit. Using auxiliary approaches, he or she may usually extend the attack to discover further pieces of the secret key.

What Is Linear Cryptanalysis in Information Security?

Linear cryptanalysis in information security is an effective approach for cryptanalysis of block ciphers. When applying linear cryptanalysis, the adversary tries to find a linear expression that approximates a non-linear function with a probability greater than 1/2. In linear cryptanalysis, the cryptanalyst's role is to identify the linear relationship between many bits of plaintext, some bits of ciphertext, and a few bits of the unknown key. For one cycle of encryption, the cryptanalyst decrypts each cipher using some relevant sub-keys and examines the resulting intermediate cipher text to compare the random outcomes.

P[α1,α2...αa]⊕C[β1,β2...βb]=K[γ1,γ2...γc]

How Does Linear Cryptanalysis in Information Security Work?

  • Computing the parity bits of known plaintexts and ciphertexts allows the attacker to obtain high probability approximations for the concealed key's parity bit.
  • The attacker can extend the assault by employing multiple ways, including the auxiliary technique, to find more bits of the secret key.
  • Linear cryptanalysis and differential cryptanalysis are the most commonly used attacks against block ciphers.
  • Linear cryptanalysis is typically divided into two phases. The first is to create linear equations relating plaintext, Ciphertext, and key bits with a high bias, that is, whose probabilities of holding are as close to 0 or 1 as possible.

How to Construct Linear Equations in Linear Cryptanalysis?

In linear cryptanalysis, a linear equation expresses the equality of two expressions made up of binary variables and the exclusive-or (XOR) operation.

For example, the following equation from a hypothetical cipher says the XOR sum of the first and third plaintext bits (as in a block cipher's block), and the first ciphertext bit equals the second bit of the key: P1⊕P3⊕C1 = K2

Because the equations used in linear cryptanalysis will vary in probability, they are more correctly referred to as linear approximations.

Advantages of Linear Cryptanalysis in Information Security

  • Linear cryptanalysis in information security is relatively easy to implement in comparison to other cryptanalytic methods.
  • It requires few computational resources and can be carried out with relatively small amounts of data.
  • Similarly, we can apply it to a wide range of cryptographic systems and block ciphers.

Limitations of Linear Cryptanalysis in Information Security

  • Despite its numerous advantages, linear cryptanalysis has a few drawbacks. For example, it is less effective against ciphers that employ a non-linear substitution box (S-box).
  • It requires a large number of known plaintext-ciphertext pairs, which can be a limitation when attempting to attack systems with limited data availability.
  • It is susceptible to noise and randomization, which have a significant impact on the attack's success rates.

Conclusion

In this article, we have learned about Linear Cryptanalysis in Information Security. Linear cryptanalysis in information security is very easy to implement compared to other cryptanalytic methods and is one of the two most popular attacks against block ciphers, other is differential cryptanalysis..


Similar Reads