Cyber Week4 LinearCryptanalysis

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:19 AM on 1/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

23 Terms

1
New cards
What is the primary aim of Linear Cryptanalysis?
To approximate block ciphers using linear expressions
2
New cards
How is a bias in a linear expression used in this attack?
The bias is used to discover secret key bits
3
New cards
In the context of S-Boxes, what do X and Y typically represent?
X represents the input bits and Y represents the output bits
4
New cards
What does it mean if an expression has an 'Agreement' of 8/16?
The expression is true half the time, meaning there is zero bias and no information leakage
5
New cards
What is the formula for calculating bias from a count of agreements out of 16?
Bias = (Count - 8) / 16
6
New cards
If an expression holds 12/16 times, what is the bias?
1/4 or 0.25
7
New cards
What is the purpose of Matsui's Piling Up Lemma?
To estimate the bias of a linear expression derived from multiple independent random variables
8
New cards
What is the Piling Up Lemma formula for two variables with biases e1 and e2?
Prob(Z1 XOR Z2 = 0) = 1/2 + 2(e1 * e2)
9
New cards
In the Piling Up Lemma, what happens if even one variable has zero bias?
The total probability becomes 0.5 (no bias)
10
New cards
What is a Linear Approximation Table (LAT)?
A table showing the deviation from a count of 8 for all input/output bit combinations
11
New cards
How is the input to an S-Box (X) related to the Plaintext (P) and Key (K)?
X = P XOR K
12
New cards
What is the 'Known Plaintext Attack' requirement for linear cryptanalysis?
The analyst must know both the plaintext and the corresponding ciphertext
13
New cards
How does a cryptanalyst 'peel off' the final round of a cipher?
By guessing the final round key to calculate intermediate values and check for bias
14
New cards
What is the result of using an incorrect final round key guess?
The derived intermediate ciphertexts will be incorrect and the bias will stay near zero
15
New cards
How do you identify the actual subkey from a table of tried candidates?
The candidate with the largest deviation (absolute bias) from 0.5 is the most likely key
16
New cards
What does SPN stand for in block cipher design?
Substitution Permutation Network
17
New cards
In an SPN, how are subkeys typically mixed with the data?
Through bitwise XOR
18
New cards
What is the relationship between the number of rounds and the total bias?
As more rounds (approximations) are added, the total bias generally decreases
19
New cards
If a linear expression has a bias of -1/32, what is the probability it is true?
15/32
20
New cards
Why is it possible to ignore the intermediate key XORs when calculating the magnitude of the bias?
Because the key bits only change the sign of the bias, not its magnitude
21
New cards
What is the 'Inverse S-box' used for in this attack?
To move backward from a ciphertext/key guess to the intermediate U bits
22
New cards
What is the E2E-approx expression composed of?
XOR sum of plaintext bits, XOR sum of intermediate U bits, and XOR sum of involved key bits
23
New cards
If you have 10,000 plaintexts, how is the experimental bias calculated?
Absolute value of (Count - 5000) divided by 10000