Addition modulo $2^n$ in block ciphers
Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 62-63.

Voir la notice de l'article provenant de la source Math-Net.Ru

Cryptographic properties of the addition modulo $2^n$ and bitwise addition modulo $2$ are analysed in this article. For the first operation, the author proposes some linear and non-linear approximations and their usage in cryptanalysis. Also, a modification of the linear cryptanalysis method is proposed. In some cases, this modification allows a more efficient way for attack. For example, an attack on eight rounds GOST 28147-89 can be carried out with this modification and cannot be done without it. The author gives examples how the approximations are used for known plaintext attack on ciphers using the addition modulo $2^n$ for key mixing. The author shows that the usage of the addition modulo $2^n$ instead of XOR increases the resistance of block ciphers to linear cryptanalysis and its non-linear modification.
Keywords: addition modulo $2^n$, block ciphers
Mots-clés : cryptanalysis.
@article{PDMA_2015_8_a21,
     author = {A. M. Karondeev},
     title = {Addition modulo $2^n$ in block ciphers},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {62--63},
     publisher = {mathdoc},
     number = {8},
     year = {2015},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2015_8_a21/}
}
TY  - JOUR
AU  - A. M. Karondeev
TI  - Addition modulo $2^n$ in block ciphers
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2015
SP  - 62
EP  - 63
IS  - 8
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2015_8_a21/
LA  - ru
ID  - PDMA_2015_8_a21
ER  - 
%0 Journal Article
%A A. M. Karondeev
%T Addition modulo $2^n$ in block ciphers
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2015
%P 62-63
%N 8
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2015_8_a21/
%G ru
%F PDMA_2015_8_a21
A. M. Karondeev. Addition modulo $2^n$ in block ciphers. Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 62-63. http://geodesic.mathdoc.fr/item/PDMA_2015_8_a21/

[1] Matsui M., “Linear cryptanalysis method for DES cipher”, LNCS, 765, 1993, 386–397

[2] Shorin V. V., Jelezniakov V. V., Gabidulin E. M., “Linear and differential cryptanalysis of Russian GOST”, Proc. Int. Workshop Coding and Cryptography (Paris, France, January 8–12, 2001), 467–476