A New Perspective of Inferring from the output of Linear Cryptanalysis Attack

Authors

  • Bhowmik D Department of Computer Science & Application, University of North Bengal, Siliguri, India
  • Datta A Department of Computer Science & Application, University of North Bengal, Siliguri, India
  • Sinha S Department of Computer Science & Application, University of North Bengal, Siliguri, India

Keywords:

Linear Cryptanalysis, Linear Approximation Table[1], S-Box, Toy cipher, Parity

Abstract

In this paper the results obtained from Linear Cryptanalysis attack developed by Matsui has been analyzed in a different perspective and inferences were drawn accordingly[2]. Here, a simple toy cipher has been put to Linear Cryptanalysis attack in order to understand the attack from a different perspective. The results thus obtained may become a guide towards designing block ciphers that can withstand Linear Cryptanalysis attacks.

References

Heys H M,”A Tutorial on Linear And Differential Cryptanalysis”, Cryptologia, Vol. 25(3),pp189-221, 2002.

Matsui M,”Linear Cr4yptanalysis Method For DES Cipher”, Advance in Cryptlogy-EUROCRYPT’93, Springer, Verlag, 386-397, 1994.

Jakobson B T, Abyar M., Nordholt P S, “Linear And Differential Cryptanalysis”, pp. 234-242, 2006.

Paar, C, Pelzl J, “Understanding Cryptography”, Berlin:Springer, Nerla, pp. 120-129, 2010.

Bhowmik D, Datta A,Sinha S,”Measuring the Diffusion Characteristic of Block Ciphers: The Bit Relationship Test (BRT)”,International Journal of Computer Science and Engineering,Vol.3(1), pp.76-80,Feb 2015.

Sharma A., Thakur RS and Jaloree S., "Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4(6), pp.8-14, Dec 2016.

Shah R. and Chouhan Y. S., "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2(1), pp.22-28, Feb 2014.

Bhowmick A., Kapur V. and Paladi S.T., "Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography", International Journal of Computer Sciences and Engineering, Vol.3(3), pp.7-12, Mar -2015.

Downloads

Published

2025-11-11

How to Cite

[1]
D. Bhowmik, A. Datta, and S. Sinha, “A New Perspective of Inferring from the output of Linear Cryptanalysis Attack”, Int. J. Comp. Sci. Eng., vol. 5, no. 2, pp. 38–42, Nov. 2025.