Another Look at Differential-Linear Attacks

Orr Dunkelman, Ariel Weizman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


Differential-Linear (DL) cryptanalysis is a well known cryptanalytic technique that combines differential and linear cryptanalysis. Over the years, multiple techniques were proposed to increase its strength. Two recent ones are: The partitioning technique by Leurent and the use of neutral bits adapted by Beierle et al. to DL cryptanalysis. In this paper we compare these techniques and discuss the possibility of using them together to achieve the best possible DL attacks. We study the combination of these two techniques and show that in many cases they are indeed compatible. We demonstrate the strength of the combination in two ways. First, we present the first DL attack on 4-round Xoodyak and an extension to 5-round in the related key model. We show that the attacks are possible only by using these two techniques simultaneously. In addition, using the combination of the two techniques we improve a DL attack on 9-round DES. We show that the partitioning technique mainly reduces the time complexity, and the use of neutral bits mainly reduces the data complexity, while the combination of them reduces both the time and data complexities.

Original languageEnglish
Title of host publicationSelected Areas in Cryptography - 29th International Conference, SAC 2022, Revised Selected Papers
EditorsBenjamin Smith, Huapeng Wu
PublisherSpringer Science and Business Media Deutschland GmbH
Number of pages21
ISBN (Print)9783031584107
StatePublished - 2024
Event29th International Conference on Selected Areas in Cryptography, SAC 2022 - Windsor, Canada
Duration: 24 Aug 202226 Aug 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13742 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference29th International Conference on Selected Areas in Cryptography, SAC 2022

Bibliographical note

Publisher Copyright:
© The Editor(s).


  • DES
  • Differential-Linear Cryptanalysis
  • Neutral Bits
  • Partitioning
  • Xoodyak

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Another Look at Differential-Linear Attacks'. Together they form a unique fingerprint.

Cite this