Impossible Differential Cryptanalysis of Zodiac(Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we discuss the impossible differential cryptapalysis for the block cipher Zodiac[10]. The main design principles of Zodiac include simplicity and efficiency. However, the diffusion layer in its round function is too simple to offer enough security. The impossible differential cryptanalysis exploits such weakness in Zodiac. Our attack using a 14-round impossible characteristic derives the 128-bit master key of the full 16-round Zodiac faster than the exhaustive search. The efficiency of the attack compared with exhaustive search increases as the key size increases.
- 社団法人電子情報通信学会の論文
- 2002-01-01
著者
-
Lee S
Center For Information Security Technologies (cist) Korea University
-
Lee Sangjin
Center For Information Security Technologies (cist) Korea University
-
MORIAI Shiho
Nippon Telegraph and Telephone Corporation
-
Lim J
Center For Information Security Technologies (cist) Korea University
-
Lim Jongin
Center For Information And Security Technologies (cist) Korea University
-
HONG Deukjo
Center for Information Security Technologies (CIST), Korea University
-
SUNG Jaechul
University of Seoul
-
Hong D
Center For Information Security Technologies (cist) Korea University
-
Hong Deukjo
Center For Information Security Technologies (cist) Korea University
-
SUNG Jaechul
Center for Information and Security Techonologies(CIST), Korea University
関連論文
- DRBAC Model Using a WSNM for Services in i-Home(New Technologies and their Applications of the Internet IV)
- The 128-Bit Block Cipher Camellia(Special Section on Cryptography and Information Security)
- Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
- Impossible Differential Cryptanalysis of Zodiac(Special Section on Cryptography and Information Security)
- Construction of UOWHF : Two New Parallel Methods(Symmetric Key Cryptography)(Cryptography and Information Security)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Side Channel Cryptanalysis on XTR Public Key Cryptosystem(Discrete Mathematics and Its Applications)
- Linear Attack Using Multiple Linear Approximations(Symmetric Key Cryptography)(Cryptography and Information Security)
- A Genetic Optimization Approach to Operation of a Multi-head Surface Mounting Machine