Linear Approximations of Pseudo-Hadamard Transform[J]. Chinese Journal of Electronics, 2012, 21(4): 715-718.
Citation: Linear Approximations of Pseudo-Hadamard Transform[J]. Chinese Journal of Electronics, 2012, 21(4): 715-718.

Linear Approximations of Pseudo-Hadamard Transform

More Information
  • Received Date: March 31, 2011
  • Revised Date: April 30, 2011
  • Published Date: October 24, 2012
  • In FSE 2003, Johan Wall′en proposed efficient log-time algorithms for computing linear approximations of addition modulo 2n. They posed that his algorithms can be generalized to more complex functions such as Pseudo-Hadamard Transform, but didn’t to the readers. In this paper, we present a formula for computing linear correlation of Pseudo-Hadamard Transform.
  • Mitsuru Matsui, “Linear cryptanalysis method for DES cipher”,in Advances in Cryptology-Eurocrypt 1993, Vol.765 of LectureNotes in Computer Science, pp.386-397, Springer-Verlag, 1993.
    Johan Wallen, “Linear approximations of addition modulo 2n”,in Fast Software Encryption 2003, Vol.2887 of Lecture Notes inComputer Science, pp.261-273, Springer-Verlag, 2003.
    James L. Massey, “SAFER K-64: A byte-oriented blockcipheringalgorithm”, in Ross Anderson, Fast Software Encryption’93, Vol.809 of Lecture Notes in Computer Science, pp.1-17,Springer-Verlag, 1993.
    Bruce Schneier, John Kelsey, Doug Whiting, David Wagner etal., The Twofish Encryption Algorithm: A 128-Bit Block Cipher,John Wiley & Sons, New York, USA, 1999.
    Eli Biham and Adi Shamir, “Differential cryptanalysis of DESlikecryptosystems”, Journal of Cryptology, Vol.4, No.1, pp.3-72, 1991.
    Helger Lipmaa, “On differential properties of Pseudo-Hadamardtransform and related mappings”, in Progress in Cryptology-Indocrypt 2002, Vol.2551 of Lecture Notes in Computer Science,pp.48-61, Springer-Verlag, 2002.
    Helger Lipmaa and Shiho Moriai, “Efficient algorithms for computingdifferential properties of addition”, Fast Software Encryption’2001, Vol.2355 of Lecture Notes in Computer Science,pp.336-350, Springer-Verlag, 2002.
    Hiroshi Miyano, “Addend dependency of differential/linearprobability of addition”, IEICE Trans. Fundamentals, Vol.81,No.1, pp.106-109, 1998.
    Zhang Wentao, Qing Sihan, Wu Wenling, “Improveddifferential-linear cryptanalysis of reduced-round SAFER++”,Chinese Journal of Electronics, Vol.13, No.1, pp.111-115, 2004.

Catalog

    Article Metrics

    Article views (665) PDF downloads (922) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return