Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
スポンサーリンク
概要
- 論文の詳細を見る
In 1997, M. Matsui proposed secret-key cryptosystems called MISTY 1 and MISTY 2, which are 8- and 12-round block ciphers with a 64-bit block, and a 128-bit key. They are designed based on the principle of provable security against differential and linear cryptanalysis. In this paper we present large collections of weak-key classes encompassing 273 and 270 weak keys for 7-round MISTY 1 and 2 for which they are vulnerable to a related-key amplified boomerang attack. Under our weak-key assumptions, the related-key amplified boomerang attack can be applied to 7-round MISTY 1 and 2 with 254, 256 chosen plaintexts and 255.3 7-round MISTY 1 encryptions, 265 7-round MISTY 2 encryptions, respectively.
- (社)電子情報通信学会の論文
- 2008-02-01
著者
-
Lim J
Center For Information Security Technologies (cist) Korea University
-
Lim Jongin
Center For Information And Security Technologies (cist) Korea University
-
Hong Seokhie
Center For Information Security Technologies (cist) Korea University
-
Lee Changhoon
Center For Information Security Technologies (cist) Korea University
-
KIM Jongsung
Center for Information Security Technologies (CIST), Korea University
-
LEE Eunjin
Center for Information Security Technologies (CIST), Korea University
-
HONG Deukjo
Center for Information Security Technologies (CIST), Korea University
-
SUNG Jaechul
University of Seoul
-
Kim Jongsung
Center For Information Security Technologies (cist) Korea University
-
Hong D
Center For Information Security Technologies (cist) Korea University
-
Hong Deukjo
Center For Information Security Technologies (cist) Korea University
-
Lee Eunjin
Center For Information Security Technologies (cist) Korea University
関連論文
- Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
- Impossible Differential Cryptanalysis of Zodiac(Special Section on Cryptography and Information Security)
- Minimum-Maximum Exclusive Weighted-Mean Filter with Adaptive Window(Digital Signal Processing)
- Side Channel Cryptanalysis on XTR Public Key Cryptosystem(Discrete Mathematics and Its Applications)
- Linear Attack Using Multiple Linear Approximations(Symmetric Key Cryptography)(Cryptography and Information Security)
- Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function