{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:59:27Z","timestamp":1740142767749,"version":"3.37.3"},"reference-count":22,"publisher":"Oxford University Press (OUP)","issue":"9","license":[{"start":{"date-parts":[[2022,6,19]],"date-time":"2022-06-19T00:00:00Z","timestamp":1655596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972393","61872359","61936008"],"award-info":[{"award-number":["61972393","61872359","61936008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Climbing Program from Institute of Information Engineering CAS","award":["E1Z0041112"],"award-info":[{"award-number":["E1Z0041112"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,18]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Differential-linear cryptanalysis, as the combination of differential and linear cryptanalysis, is an efficient way to attack many kinds of ciphers. Recently, various refinements to this cryptanalytic technique have been proposed, especially with good effects on ARX ciphers. In the current framework of a differential-linear attack, a cipher $E$ is often divided into three parts: a differential part $E_1$, a linear part $E_2$ and a connective part $E_m$. It is a challenging problem to deal with the connective part when building a differential-linear distinguisher, and for ARX ciphers, estimating the correlation of $ E_m $ experimentally under given input difference $\\Delta _m$ and output linear mask $\\Gamma _m$ is the main approach so far. In this paper, we discuss the effects of $ \\Delta _{m} $ and $ \\Gamma _{m} $ on the correlation of $ E_m $ for the first time. As a result, we propose a new strategy to find $\\Delta _m$ and $\\Gamma _m$ to build differential-linear distinguishers with high correlations for ARX ciphers based on algebraic equations derived from their round functions. For the key recovery parts of differential-linear attacks, we also find a new partitioning technique which will reduce the time complexity. Based on our new methods, we improve the differential-linear attack on 7-round Chaskey.<\/jats:p>","DOI":"10.1093\/comjnl\/bxac076","type":"journal-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T13:47:35Z","timestamp":1655732855000},"page":"2279-2295","source":"Crossref","is-referenced-by-count":0,"title":["New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey"],"prefix":"10.1093","volume":"66","author":[{"given":"Yaqi","family":"Xu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences , Beijing , China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing , China"}]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences , Beijing , China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing , China"}]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences , Beijing , China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing , China"}]}],"member":"286","published-online":{"date-parts":[[2022,6,19]]},"reference":[{"key":"2023091720461115600_ref1","first-page":"434","volume-title":"Advances in Cryptology - CRYPTO \u201887, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987","author":"Fumy","year":"1987"},{"key":"2023091720461115600_ref2","article-title":"The simon and speck families of lightweight block ciphers","volume":"Report 2013\/404","author":"Beaulieu","year":"2013","journal-title":"Cryptology ePrint Archive"},{"key":"2023091720461115600_ref3","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs - The eSTREAM Finalists","author":"Bernstein","year":"2008"},{"key":"2023091720461115600_ref4","first-page":"3","article-title":"Chacha, a variant of salsa20","volume":"8","author":"Bernstein","year":"2008","journal-title":"Workshop Record of SASC"},{"article-title":"Sha3 proposal blake","year":"2008","author":"Aumasson","key":"2023091720461115600_ref5"},{"key":"2023091720461115600_ref6","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-319-13051-4_19","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014, Cham","author":"Mouha","year":"2014"},{"key":"2023091720461115600_ref7","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/11502760_3","volume-title":"Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers","author":"Bernstein","year":"2005"},{"key":"2023091720461115600_ref8","first-page":"1","article-title":"Chacha20-poly1305 cipher suites for transport layer security (TLS)","volume":"7905","author":"Langley","year":"2016","journal-title":"RFC"},{"key":"2023091720461115600_ref9","first-page":"17","volume-title":"Advances in Cryptology - CRYPTO \u201894, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings","author":"Langford","year":"1994"},{"key":"2023091720461115600_ref10","first-page":"156","volume-title":"Fast Software Encryption, 6th International Workshop, FSE \u201899, Rome, Italy, March 24-26, 1999, Proceedings","author":"Wagner","year":"1999"},{"key":"2023091720461115600_ref11","first-page":"741","volume-title":"Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part I","author":"Liu","year":"2021"},{"key":"2023091720461115600_ref12","first-page":"2","volume-title":"Advances in Cryptology - CRYPTO \u201890, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings","author":"Biham","year":"1990"},{"key":"2023091720461115600_ref13","first-page":"386","volume-title":"Advances in Cryptology - EUROCRYPT \u201893, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings","author":"Matsui","year":"1993"},{"key":"2023091720461115600_ref14","first-page":"313","volume-title":"Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I","author":"Bar-On","year":"2019"},{"key":"2023091720461115600_ref15","first-page":"344","volume-title":"Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I","author":"Leurent","year":"2016"},{"key":"2023091720461115600_ref16","first-page":"329","volume-title":"Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III","author":"Beierle","year":"2020"},{"key":"2023091720461115600_ref17","article-title":"Further improving differential-linear attacks: Applications to chaskey and serpent","volume":"Report 2021\/820","author":"Broll","year":"2021","journal-title":"Cryptology ePrint Archive"},{"key":"2023091720461115600_ref18","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1017\/CBO9780511780448.011","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"Carlet","year":"2010"},{"key":"2023091720461115600_ref19","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201893, Berlin, Heidelberg","author":"Matsui","year":"1994"},{"key":"2023091720461115600_ref20","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1007\/s00145-016-9237-5","article-title":"Differential-linear cryptanalysis revisited","volume":"30","author":"Blondeau","year":"2017","journal-title":"J. Cryptol."},{"key":"2023091720461115600_ref21","doi-asserted-by":"crossref","first-page":"1827","DOI":"10.1007\/s10623-020-00736-9","article-title":"Proving the biases of salsa and chacha in differential attack","volume":"88","author":"Dey","year":"2020","journal-title":"Des. Codes Cryptogr."},{"key":"2023091720461115600_ref22","first-page":"711","volume-title":"Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part I","author":"Coutinho","year":"2021"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/9\/2279\/51643529\/bxac076.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/9\/2279\/51643529\/bxac076.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,17]],"date-time":"2023-09-17T21:09:34Z","timestamp":1694984974000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/66\/9\/2279\/6611469"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,19]]},"references-count":22,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2022,6,19]]},"published-print":{"date-parts":[[2023,9,18]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxac076","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2023,9]]},"published":{"date-parts":[[2022,6,19]]}}}