Piling-up lemma explained

In cryptanalysis, the piling-up lemma is a principle used in linear cryptanalysis to construct linear approximations to the action of block ciphers. It was introduced by Mitsuru Matsui (1993) as an analytical tool for linear cryptanalysis.[1] The lemma states that the bias (deviation of the expected value from 1/2) of a linear Boolean function (XOR-clause) of independent binary random variables is related to the product of the input biases:[2]

\epsilon(X1 ⊕ X2 ⊕ … ⊕

n-1
X
n)=2
n
\prod
i=1

\epsilon(Xi)

or

I(X1 ⊕ X2 ⊕ … ⊕ Xn)

n
=\prod
i=1

I(Xi)

where

\epsilon\in[-\tfrac{1}{2},\tfrac{1}{2}]

is the bias (towards zero[3]) and

I\in[-1,1]

the imbalance:[4] [5]

\epsilon(X)=P(X=0)-

1
2

I(X)=P(X=0)-P(X=1)=2\epsilon(X)

.Conversely, if the lemma does not hold, then the input variables are not independent.[6]

Interpretation

The lemma implies that XOR-ing independent binary variables always reduces the bias (or at least does not increase it); moreover, the output is unbiased if and only if there is at least one unbiased input variable.

Note that for two variables the quantity

I(XY)

is a correlation measure of

X

and

Y

, equal to

P(X=Y)-P(X\neY)

;

I(X)

can be interpreted as the correlation of

X

with

0

.

Expected value formulation

The piling-up lemma can be expressed more naturally when the random variables take values in

\{-1,1\}

. If we introduce variables

\chii=1-2Xi=

Xi
(-1)
(mapping 0 to 1 and 1 to -1) then, by inspection, the XOR-operation transforms to a product:

\chi1\chi2 … \chin=1-2(X1X2 ⊕ … ⊕ Xn)=

X1X2 ⊕ … ⊕ Xn
(-1)

and since the expected values are the imbalances,

E(\chii)=I(Xi)

, the lemma now states:
n
E\left(\prod
i=1

\chii

nE(\chi
\right)=\prod
i)

which is a known property of the expected value for independent variables.

For dependent variables the above formulation gains a (positive or negative) covariance term, thus the lemma does not hold. In fact, since two Bernoulli variables are independent if and only if they are uncorrelated (i.e. have zero covariance; see uncorrelatedness), we have the converse of the piling up lemma: if it does not hold, the variables are not independent (uncorrelated).

Boolean derivation

The piling-up lemma allows the cryptanalyst to determine the probability that the equality:

X1 ⊕ X2 ⊕ … ⊕ Xn=0

holds, where the Xs are binary variables (that is, bits: either 0 or 1).

Let P(A) denote "the probability that A is true". If it equals one, A is certain to happen, and if it equals zero, A cannot happen. First of all, we consider the piling-up lemma for two binary variables, where

P(X1=0)=p1

and

P(X2=0)=p2

.

Now, we consider:

P(X1X2=0)

Due to the properties of the xor operation, this is equivalent to

P(X1=X2)

X1 = X2 = 0 and X1 = X2 = 1 are mutually exclusive events, so we can say

P(X1=X2)=P(X1=X2=0)+P(X1=X2=1)=P(X1=0,X2=0)+P(X1=1,X2=1)

Now, we must make the central assumption of the piling-up lemma: the binary variables we are dealing with are independent; that is, the state of one has no effect on the state of any of the others. Thus we can expand the probability function as follows:

P(X1X2=0)

=P(X1=0)P(X2=0)+P(X1=1)P(X2=1)

=p1p2+(1-p1)(1-p2)

=p1p2+(1-p1-p2+p1p2)

=2p1p2-p1-p2+1

Now we express the probabilities p1 and p2 as + ε1 and + ε2, where the ε's are the probability biases - the amount the probability deviates from .

P(X1X2=0)

=2(1/2+\epsilon1)(1/2+\epsilon2)-(1/2+\epsilon1)-(1/2+\epsilon2)+1

=1/2+\epsilon1+\epsilon2+2\epsilon1\epsilon2-1/2-\epsilon1-1/2-\epsilon2+1

=1/2+2\epsilon1\epsilon2

Thus the probability bias ε1,2 for the XOR sum above is 2ε1ε2.

This formula can be extended to more Xs as follows:

P(X1 ⊕ X2 ⊕ … ⊕

n-1
X
n=0)=1/2+2
n
\prod
i=1

\epsiloni

Note that if any of the ε's is zero; that is, one of the binary variables is unbiased, the entire probability function will be unbiased - equal to .

A related slightly different definition of the bias is

\epsiloni=P(Xi=1)-P(Xi=0),

in fact minus two times the previous value. The advantage is that now with

\varepsilontotal=P(X1 ⊕ X2 ⊕ … ⊕ Xn=1)-P(X1 ⊕ X2 ⊕ … ⊕ Xn=0)

we have

\varepsilontotal=(-1)n+1

n
\prod
i=1

\varepsiloni,

adding random variables amounts to multiplying their (2nd definition) biases.

Practice

In practice, the Xs are approximations to the S-boxes (substitution components) of block ciphers. Typically, X values are inputs to the S-box and Y values are the corresponding outputs. By simply looking at the S-boxes, the cryptanalyst can tell what the probability biases are. The trick is to find combinations of input and output values that have probabilities of zero or one. The closer the approximation is to zero or one, the more helpful the approximation is in linear cryptanalysis.

However, in practice, the binary variables are not independent, as is assumed in the derivation of the piling-up lemma. This consideration has to be kept in mind when applying the lemma; it is not an automatic cryptanalysis formula.

See also

Notes and References

  1. Book: 10.1007/3-540-48285-7_33 . Linear Cryptanalysis Method for DES Cipher . Advances in Cryptology – EUROCRYPT '93 . Lecture Notes in Computer Science . 1994 . Matsui . Mitsuru . 765 . 386–397 . 978-3-540-57600-6 . 533517 .
  2. Web site: Li . Qin . Boztaş . S. . Extended Linear Cryptanalysis and Extended Piling-up Lemma . ISC Turkey . December 2007 . 5508314 . https://web.archive.org/web/20170117175343/http://www.iscturkey.org/assets/files/2016/03/2007-49.pdf . 2017-01-17.
  3. The bias (and imbalance) may also be taken as an absolute value; if the bias with flipped sign (bias towards one) is used the lemma needs an additional (-1)^(n+1) sign factor in the right hand side.
  4. Book: 10.1007/3-540-49264-X_3 . A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-up Lemma . Advances in Cryptology – EUROCRYPT '95 . Lecture Notes in Computer Science . 1995 . Harpes . Carlo . Kramer . Gerhard G. . Massey . James L. . 921 . 24–38 . 978-3-540-59409-3 .
  5. Book: 10.1007/3-540-46665-7_22 . The Piling-Up Lemma and Dependent Random Variables . Cryptography and Coding . Lecture Notes in Computer Science . 1999 . Kukorelly . Zsolt . 1746 . 186–190 . 978-3-540-66887-9 .
  6. Web site: Nyberg. Kaisa. February 26, 2008. Linear Cryptanalysis (Cryptology lecture). Helsinki University of Technology, Laboratory for Theoretical Computer Science.