Bay, Asli
Mashatan, Atefeh
Vaudenay, Serge
Revisiting Iterated Attacks in the Context of Decorrelation Theory
Cryptography and Communications
Cryptography and Communications
Cryptography and Communications
Cryptography and Communications
6
4
Block ciphers
Decorrelation Theory
Iterated attacks
Differential-linear distinguishers
Boomerang distinguishers
2014
2014
Iterated attacks are comprised of iterating adversaries who can make d plaintext queries, in each iteration to compute a bit, and are trying to distinguish between a random cipher C and the perfect cipher C* based on all bits. Vaudenay showed that a 2d-decorrelated cipher resists to iterated attacks of order d. when iterations have almost no common queries. Then, he first asked what the necessary conditions are for a cipher to resist a non-adaptive iterated attack of order d. I.e., whether decorrelation of order 2d-1 could be sufficient. Secondly, he speculated that repeating a plaintext query in different iterations does not provide any advantage to a non-adaptive distinguisher. We close here these two long-standing open problems negatively. For those questions, we provide two counter-intuitive examples. We also deal with adaptive iterated adversaries who can make both plaintext and ciphertext queries in which the future queries are dependent on the past queries. We show that decorrelation of order 2d protects against these attacks of order d. We also study the generalization of these distinguishers for iterations making non-binary outcomes. Finally, we measure the resistance against two well-known statistical distinguishers, namely, differential-linear and boomerang distinguishers and show that 4-decorrelation degree protects against these attacks.
Cryptography and Communications
Journal Articles
10.1007/s12095-014-0101-x