In
cryptography, higher-order differential cryptanalysis is a generalization of
differential cryptanalysis
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can aff ...
, an attack used against
block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called ''blocks''. Block ciphers are specified cryptographic primitive, elementary components in the design of many cryptographic protocols and ...
s. While in standard differential cryptanalysis the difference between only two texts is used, higher-order differential cryptanalysis studies the propagation of a set of differences between a larger set of texts.
Xuejia Lai
Xuejia Lai () is a cryptographer, currently a professor at Shanghai Jiao Tong University. His notable work includes the design of the block cipher IDEA based on the Lai-Massey scheme, the theory of Markov ciphers, and the cryptanalysis of a numbe ...
, in 1994, laid the groundwork by showing that differentials are a special case of the more general case of higher order derivates.
Lars Knudsen, in the same year, was able to show how the concept of higher order derivatives can be used to mount attacks on block ciphers.
These attacks can be superior to standard differential cryptanalysis. Higher-order differential cryptanalysis has notably been used to break the
KN-Cipher
In cryptography, KN-Cipher is a block cipher created by Kaisa Nyberg and Lars Knudsen in 1995. One of the first ciphers designed to be provably secure against ordinary differential cryptanalysis, KN-Cipher was later broken using higher order diff ...
, a cipher which had previously been proved to be immune against standard differential cryptanalysis.
Higher-order derivatives
A block cipher which maps
-bit strings to
-bit strings can, for a fixed key, be thought of as a function
. In standard differential cryptanalysis, one is interested in finding a pair of an input difference
and an output difference
such that two input texts with difference
are likely to result in output texts with a difference
i.e., that
is true for many
. Note that the difference used here is the
XOR
Exclusive or or exclusive disjunction is a logical operation that is true if and only if its arguments differ (one is true, the other is false).
It is symbolized by the prefix operator J and by the infix operators XOR ( or ), EOR, EXOR, , ...
which is the usual case, though other definitions of difference are possible.
This motivates defining the derivative of a function
at a point
as
Using this definition, the
-th derivative at
can recursively be defined as
Thus for example
.
Higher order derivatives as defined here have many properties in common with
ordinary derivative
In mathematics, the derivative of a function of a real variable measures the sensitivity to change of the function value (output value) with respect to a change in its argument (input value). Derivatives are a fundamental tool of calculus. F ...
such as the
sum rule and the
product rule. Importantly also, taking the derivative reduces the
algebraic degree of the function.
Higher-order differential attacks
To implement an attack using higher order derivatives, knowledge about the probability distribution of the derivative of the cipher is needed. Calculating or estimating this distribution is generally a hard problem but if the cipher in question is known to have a low
algebraic degree, the fact that derivatives reduce this degree can be used. For example, if a cipher (or the S-box function under analysis) is known to only have an algebraic degree of 8, any 9th order derivative must be 0.
Therefore, it is important for any
cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
or S-box function in specific to have a maximal (or close to maximal) degree to defy this attack.
Cube attack
The cube attack is a method of cryptanalysis applicable to a wide variety of symmetric-key algorithms, published by Itai Dinur and Adi Shamir in a September 2008 preprint.
Attack
A revised version of this preprint was placed online in January 20 ...
s have been considered a variant of higher-order differential attacks.
Resistance against Higher-order differential attacks
Limitations of Higher-order differential attacks
Works for small or low algebraic degree S-boxes or small S-boxes. In addition to AND and XOR operations.
See also
*
Differential Cryptanalysis
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can aff ...
*
KN-Cipher
In cryptography, KN-Cipher is a block cipher created by Kaisa Nyberg and Lars Knudsen in 1995. One of the first ciphers designed to be provably secure against ordinary differential cryptanalysis, KN-Cipher was later broken using higher order diff ...
*
Cube attack
The cube attack is a method of cryptanalysis applicable to a wide variety of symmetric-key algorithms, published by Itai Dinur and Adi Shamir in a September 2008 preprint.
Attack
A revised version of this preprint was placed online in January 20 ...
References
{{Cryptography navbox , block
Cryptographic attacks