2019-03-23 Daily Challenge
Due to visit of my friend, I spent a lot of time playing with him. It's so relaxing, so I'm not productive this weekend. :D
I've read A Tutorial on Linear and Differential Cryptanalysis back and forth, and figured out what to do with differential cryptanalysis.
Step to follow to complete differential cryptanalysis attack
- Generate DDT(Differential Distribution Table) of SBOX, if there are many SBOXs, generate DDTs for each of SBOX.
- Find path to construct a good path.(Good for me, I'll explain it later.)
- Get enough plainttext-cipher XOR pairs, for a bias of $\varepsilon$, a roughly amount of $\frac{c}{\varepsilon}$ is required, where $c$ is a small constant. The more pairs, the better. But too much does not make much sense.
- For your constructed path, try to recover keys by following instruction of tutorial.
- Repeat step 2-4 until you get subkey of last round.
- Repeat step 1-5 until you get all subkeys except first XOR.
- Use subkeys to recover first XOR key by reverse encryption process and known plaintext.
But I haven't finish my attack towards any cipher, so, hope this post does't mislead someone. I'll update it if I prove that it was wrong.