A Study on Higher Order Differential Attack of Camellia(Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
The encryption algorithm Camellia is a 128 bit block cipher proposed by NTT and Mitsubishi, Japan. Since the algebraic degree of the outputs after 3 rounds is greater than 128, designers estimate that it is impossible to attack Camellia by higher order differential. In this paper, we show a new higher order differential attack which controls the value of differential using proper fixed value of plaintext. As the result, we found that 6-round F-function can be attacked using 8th order differentials. The attack requires 2^17 chosen plaintexts and 2^22 F-function operations. Our computer simulation took about 2 seconds for the attack. If we take 2-R elimination algorithm, 7-round F-function will be attacked using 8th order differentials. This attack requires 2^19 chosen plaintexts and 2^64 F-function operations, which is less than exhaustive search for 128 bit key.
- 社団法人電子情報通信学会の論文
- 2003-01-01
著者
-
Takeda Masaki
Department Of Electrical Engineering Faculty Of Science And Technology Tokyo University Of Science
-
Kaneko Toshinobu
Department Of Electrical Engineering Faculty Of Science And Technology
-
Kawabata Takeshi
Department Of Electrical Engineering Faculty Of Science And Technology Tokyo University Of Science
-
Kaneko Toshinobu
Department Of Electrical Engineering Faculty Of Science And Technology Tokyo University Of Science
-
Kaneko Toshinobu
Department Of Electric Engineering Science University Of Tokyo
-
Takeda Masaki
Department of Applied Biological Chemistry, Faculty of Agriculture, Meijo University
関連論文
- Lowering the Error Floors of Irregular LDPC Code on Fast Fading Environment with Perfect and Imperfect CSIs(Wireless Communication Technologies)
- A Study on Higher Order Differential Attack of KASUMI(Symmetric Cryptography,Cryptography and Information Security)
- Changes in Aerobic Capacity and Coronary Risk Factors during Long-term Exercises Training in Women with Ischemic Heart Disease: A 36-month Follow-up
- Effects of Exercise Conditioning on Vital Age in Hyperlipidemic Women
- Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method
- Mapping for Iterative MMSE-SIC with Belief Propagation
- A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Optimization for the Algebraic Method and Its Application to an Attack of MISTY1 (Symmetric Cipher) (Cryptography and Information Security)
- Scheduling Algorithm with Power Allocation for Random Unitary Beamforming
- MIMO Systems in the Presence of Feedback Delay
- Strength of Round function in RC6 Block Cipher against Higher Order Differential Attack
- The Algeblaic Degree and Security of Generalized PURE Ciphers
- Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite(Information Theory and Its Applications)
- An Effective Synthesis of 5,4′-Disubstituted Flavones via a Cesium Enolate Assisted Intramolecular ipso-Substitution Reaction
- A Study on Higher Order Differential Attack of Camellia(Special Section on Cryptography and Information Security)
- Special Section on Cryptography and Information Security
- A New Higher Order Differential of CLEFIA