An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
We introduce an efficient interpolation attack which gives the tighter upper bound of the complexity and the number of pairs of plaintexts and ciphertexts required for the attack.In the previously known interpolation attack there is a problem in that the required complexity for the attack can be overestimated.We solve this problem by first, finding the actual number of coefficients in the polynomial used in the attack by using a computer algebra system, and second, by finding the polynomial with fewer coefficients by choosing the plaintexts.We apply this interpolation attack to the block cipher SNAKE and succeeded in attacking many ciphers in the SNAKE family.When we evaluate the resistance of a block cipher to interpolation attack, it is necessary to apply the interpolation attack described in this paper.
- 2000-01-25
著者
-
MORIAI Shiho
NTT Laboratories
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES LTD.
-
Moriai S
Nippon Telegraph And Telephone Corp. Yokosuka‐shi Jpn
-
Kaneko Toshinobu
Science University of Tokyo
-
Shimoyama T
Fujitsu Lab. Ltd. Kawasaki‐shi Jpn
-
Kaneko T
Sci. Univ. Tokyo Chiba Jpn
-
Kaneko T
Tokyo Univ. Sci. Noda‐shi Jpn
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES Ltd
関連論文
- Extending Bleichenbachers Forgery Attack
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- Linear Cryptanalysis by Linear Sieve Method (Special Section on Cryptography and Information Security)
- The 128-Bit Block Cipher Camellia(Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Key-Dependency of Linear Probability of RC5 (Special Section on Cryptography and Information Security)
- The Best Linear Expression Search of FEAL (Special Section on Cryptography and Information Security)
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- FOREWORD (Special Section on Cryptography and Information Security)
- Theoretical Analysis of x^2 Attack on RC6 (Symmetric Cipher) (Cryptography and Information Security)
- The Security of an RDES Cryptosystem against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- A MAC Forgery Attack on SOBER-128(Discrete Mathematics and Its Applications)
- Special Section on Cryptography and Information Security
- Dynamic Swapping Schemes and Differential Cryptanalysis (Special Section on Information Theory and Its Applications)
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- Diffretial Cryptanalysis of CAST-256 Reduced to Nine Quad-Rounds(Special Section on Fundamentals of Information and Communications)
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
- Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)
- Extending Bleichenbacher's Forgery Attack
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160