期刊文献+

Impossible Differential Attacks on 13-Round CLEFIA-128 被引量:6

Impossible Differential Attacks on 13-Round CLEFIA-128
原文传递
导出
摘要 CLEFIA, a new 128-bit block cipher proposed by Sony Corporation, is increasingly attracting cryptanalysts' attention. In this paper, we present two new impossible differential attacks on 13 rounds of CLEFIA-128. The proposed attacks utilize a variety of previously known techniques, in particular the hash table technique and redundancy in the key schedule of this block cipher. The first attack does not consider the whitening layers of CLEFIA, requires 21~9"5 chosen plaintexts, and has a running time equivalent to about 2112.9 encryptions. The second attack preserves the whitening layers, requires 2117.8 chosen plaintexts, and has a total time complexity equivalent to about 2121.2 encryptions. CLEFIA, a new 128-bit block cipher proposed by Sony Corporation, is increasingly attracting cryptanalysts' attention. In this paper, we present two new impossible differential attacks on 13 rounds of CLEFIA-128. The proposed attacks utilize a variety of previously known techniques, in particular the hash table technique and redundancy in the key schedule of this block cipher. The first attack does not consider the whitening layers of CLEFIA, requires 21~9"5 chosen plaintexts, and has a running time equivalent to about 2112.9 encryptions. The second attack preserves the whitening layers, requires 2117.8 chosen plaintexts, and has a total time complexity equivalent to about 2121.2 encryptions.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第4期744-750,共7页 计算机科学技术学报(英文版)
关键词 block cipher CRYPTANALYSIS impossible differential CLEFIA block cipher, cryptanalysis, impossible differential, CLEFIA
  • 相关文献

参考文献14

  • 1Shirai T, Shibutani t(. On feistel structures using a diffusion switching mechanism. In Proc. FSE 2006, Graz, Austria, Mar. 15-17, 2006, pp.41-56.
  • 2Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T. The 128-bit block cipher CLEFIA (extended abstract). In Proc. FSE 2007, Luxembourg, Mar. 26-28, 2007, pp.181-195.
  • 3The 128 bit block cipher CLEFIA algorithm specification. Sony Corporation, http://www.sony.net/Products/crypto- graphy/clefia/technical/dat a/clefia-spec- 1.0.pdf, Jun. 1, 2007.
  • 4Lee C, Kim J, Sung J, Hong S, Lee S. Provable security for an RC6-1ike structure and a MISTY-FO-like structure against differential cryptanalysis. In Proc. ICCSA 2006, Glasgow, UK, May 8-11, 2006, pp.446-455.
  • 5Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991, 4(1): 3-72.
  • 6Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In Proc. EUROCRYPT lggg, Prague, Czech, May 2-6, 1999, pp.12-23.
  • 7The 128-bit block cipher CLEFIA security and perfor- mance evaluations. Sony Corporation, http://www.sony.net/Products/cryptography/clefia/technical/data/clefia-eval- 1.O.pdf, Jun. 1, 2007.
  • 8Tsunoo Y, Tsujihara E, Shigeri M, Saito T, Suzaki T, Kubo H. Impossible differential cryptanalysis of CLEFIA. In Proc. FSE 2008, Lausanne, Switzerland, Feb. 10-13, 2008, pp.398- 411.
  • 9Wang W, Wang X. Improved impossible differential crypt- analysis of CLEFIA. Cryptology ePrint Archive, Report 2007/466, http://eprint.iacr.org/.
  • 10Sun B, Ruilin L, Wang M, Li P, Li C. Impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report 2008/151, http://eprint.iacr.org/.

同被引文献19

  • 1吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:21
  • 2Nakahara J Jr.3D:A three-dimensional block cipher[J].LNCS,2008,5339:252-267.
  • 3Knudsea L.DEAL-a 128-bit block cipher[J].Journal of Complexity,1998,258:2-11.
  • 4Biham E,Biryukov A,and Shamir A.Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials [J].LNCS,1999,1592:12-23.
  • 5Liu Ya,Gu Dawu,Liu Zhi-qiang,et al.New improved impossible differential attack on reduced-round AES-128[C].Computer Science and Convergence,Springer-Verlag,Jeju,Korea,2012,Vol.114:453-461.
  • 6Jia K,Li L,Rechberger C,et al.Impossible differential attacks on reduced-round MISTYI[J].LNCS,2013,7707:222-233.
  • 7Liu Y,Li L,Gu D,et al.New observations on impossible differential cryptanalysis of reduced-round Camellia[J].LNCS,2012,7549:90-109.
  • 8Biham E and Dunkelman O.Related-key impossible differential attacks on 8-round AES-192[J].LNCS,2006,3860:21-33.
  • 9Cihangir Tezcan.The improbable differential attack:cryptanalysis of reduced-round CLEFIA[J].LNCS,2010,6498:197-209.
  • 10Nakahara J Jr.New impossible differential and known-key distinguishers for the 3D cipher[J].LNCS,2011,6672:208-221.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部