Cryptography Reference
In-Depth Information
Fig. 3.7 Error propagation
paths from L r to L 15 for
r
=
12 and r
=
11
3.4.2 Wrong Key Distinguishers
As in the previous attacks, every subkey K 16 , i is retrieved independently. For every
i
∈{
1
,...,
8
}
,( 3.6 ) is equivalent to
Δ
R 16 =
S i E i (
K 16 , i
S i E i (
K 16 , i
Δ
L 15 .
L 16 )
P 1
i
P 1
i
L 16 )
(3.7)
Let us define g i as the function that predicts P 1
C )
L 15 )
according to a pair
(
C
,
i
and a guess k on the value of K 16 , i :
S i E i (
k
S i E i (
k
Δ
R 16 .
L 16 )
C ),
P 1
i
g i ((
C
,
k
) =
L 16 )
P 1
i
C ,
From ( 3.7 ), we have g i (
,
) =
L 15 )
=
C
k
for the correct key guess k
K 16 , i .
C ,
On the other hand, g i (
C
,
k
)
can be assumed to have a uniform distribution for a
Search WWH ::




Custom Search