On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
Weakness of a block cipher, which has provable immunity against linear cryptanalysis, is investigated. To this end, the round transformation used in MISTY, which is a data encryption algorithm recently proposed by M. Matsui from Mitsubishi Electric Corporation, is compared to the round transformation of DES from the point of view of pseudorandom generation. An important property of the MISTY cipher is that, in terms of theoretically provable resistance against linear and differential cryptanalysis, which are the most powerful cryptanalytic attacks known to date, it is more robust than the Data Encryption Standard or DES. This property can be attributed to the application of a new round transform in the MISTY cipher, which is obtained by changing the location of the basic round-function in a transform used in DES. Cryptographic roles of the transform used in the MISTY cipher are the main focus of this paper. Our research reveals that when used for constructing pseudorandom permutations, the transform employed by the MISTY cipher is inferior to the transform in DES, though the former is superior to the latter in terms of strength against linear and differential attacks. More specifically, we show that a 3-round (4-round, respectively) concatenation of transforms used in the MISTY cipher is not a pseudorandom (super pseudorandom, respectively) permutation. For comparison, we note that with three (four, respectively) rounds, transforms used in DES yield a pseudorandom (super pseudorandom, respectively) permutation. Another contribution of this paper is to show that a 3-round concatenation of transforms used in (the preliminary version of) the MISTY cipher has an algebraic property, which may open a door for various cryptanalytic attacks. These results clearly indicate that provable immunity against linear and differential cryptanalysis is not sufficient for designing a secure block cipher, and the security of the MISTY cipher will remain open until a close examination of its resistance is conducted against other cryptanalytic attacks than the linear or differential attack.
- 社団法人電子情報通信学会の論文
- 1997-01-25
著者
-
ZHENG Yuliang
School of Comp. and Info. Tech., Monash University
-
Sakurai K
Kyushu Univ. Fukuoka‐shi Jpn
-
SAKURAI Kouichi
Department of Computer Science and Communication Engineering, Kyushu University
-
Zheng Y
Univ. North Carolina Charlotte Nc Usa
-
Zheng Yuliang
Department Of Software And Information Systems
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
Zheng Yuliang
School Of Comp. And Info. Tech. Monash University
-
Sakurai Kouichi
Department Of Applied Science Faculty Of Engineering 36 Kyushu University
関連論文
- 非超特異楕円曲線に対するMOVアルゴリズムの実現 (2)
- 非超特異楕円曲線に対するMOVアルゴリズムの実現(2)
- 楕円曲線における Signcryption方式
- 不正者追跡署名を用いたソフトウェア保護方式
- Reliable Key Distribution Scheme for Lossy Channels
- On the Practical Performance of Hyperelliptic Curve Cryptosystems in Software Implementation(Special Section on Discrete Mathematics and Its Applications)
- 電子透かしのための双方向プロトコル
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer (Special Section on Discrete Mathematics and Its Applications)
- 情報量的安全性に基づく署名方式における安全性の概念について
- 情報量的安全性に基づく暗号化方式に対する安全性の概念および構成法について
- 情報量的安全性に基づく暗号化方式に対する安全性の概念および構成法について
- 情報量的安全性に基づく暗号化方式について
- 情報量的安全性に基づく署名方式の構成法について
- 情報量的安全性に基づく署名方式の構成法について
- A reliability analysis based scheduling algorithm in heterogeneous system
- A Flexible User-centric Resource Scheduling Algorithm
- Analysis and Comparison of Crytographic Techniques in E-voting and E-auction
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- Reliable Key Distribution Scheme for Lossy Channels
- D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
- Private Data Clustering based on Secure Approximation
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Secure Electronic Transaction(SET)の高速化に関する一手法
- Secure Electronic Transaction (SET) の高速化に関する一検討
- 単一ATMセルを用いた守秘認証機能付き鍵配送方式
- SPEED暗号の安全性について
- Analysis and Design for Private Message Board Systems
- On the Complexity of the Discrete Logarithm for a General Finite Group (Special Section on Cryptography and Information Security)
- Improved Subset Difference Method with Ternary Tree
- Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
- On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Signcryptionによる効率的なIPng鍵情報配送
- Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost(Application)(Cryptography and Information Security)
- Analysis and Design for Private Message Board Systems (Applications) (Cryptography and Information Security)
- Special Section on Discrete Mathematics and Its Applications
- Securing Provenance of Distributed Processes in an Untrusted Environment
- Equivalence problem and automorphisms of some abelian branched coverings of the Riemann sphere