Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
スポンサーリンク
概要
- 論文の詳細を見る
Since the proposal of differential cryptanalysis and linear cryptanalysis in 1991 and 1993, respectively, the resistance to these cryptanalysis has been studied. In FSE2, Knudsen proposed a method of attacking block ciphers that used the higher order differential, and in FSE4, Jakobsen and Knudsen applied it to a cipher proposed by Nyberg and Knudsen. Their approach, however, requires large complexity of running time. In this paper, we improve this attack and show that our improved algorithm requires much fewer chosen texts and much less complexity than those of previous works.
- 社団法人電子情報通信学会の論文
- 1999-09-25
著者
-
Tsujii Shigeo
Chuo University
-
MORIAI Shiho
NTT Laboratories
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES LTD.
-
Moriai S
Nippon Telegraph And Telephone Corp. Yokosuka‐shi Jpn
-
Tsujii Shigeo
Chuo Univ. Tokyo Jpn
-
Kaneko Toshinobu
Science University of Tokyo
-
Shimoyama T
Fujitsu Lab. Ltd. Kawasaki‐shi Jpn
-
Kaneko T
Sci. Univ. Tokyo Chiba Jpn
-
Kaneko T
Tokyo Univ. Sci. Noda‐shi Jpn
-
SHIMOYAMA Takeshi
Telecommunications Advancement Organization of Japan
関連論文
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- Linear Cryptanalysis by Linear Sieve Method (Special Section on Cryptography and Information Security)
- The 128-Bit Block Cipher Camellia(Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Key-Dependency of Linear Probability of RC5 (Special Section on Cryptography and Information Security)
- The Best Linear Expression Search of FEAL (Special Section on Cryptography and Information Security)
- FOREWORD (Special Section on Cryptography and Information Security)
- Theoretical Analysis of x^2 Attack on RC6 (Symmetric Cipher) (Cryptography and Information Security)
- The Security of an RDES Cryptosystem against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- A MAC Forgery Attack on SOBER-128(Discrete Mathematics and Its Applications)
- Special Section on Cryptography and Information Security
- Dynamic Swapping Schemes and Differential Cryptanalysis (Special Section on Information Theory and Its Applications)
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- An Electronic Voting Protocol Preserving Voter's Privacy(Applications of Information Security Techniques)
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- Diffretial Cryptanalysis of CAST-256 Reduced to Nine Quad-Rounds(Special Section on Fundamentals of Information and Communications)