Optimization for the Algebraic Method and Its Application to an Attack of MISTY1 (Symmetric Cipher) (<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we describe a technique for optimizing the algebraic method that is applied to higher order differential attack. The higher order differential attack is a well-known attack on block ciphers, in which we derive an attack equation to determine a round key from a property of a higher order differential of a target block cipher. The algebraic method is a linearization of the attack equation and determines the true key by a method such as Gaussian elimination. Our technique is based on linear dependency and can reduce the complexity of that method. We also describe a technique that allows the algebraic method to be used as an attack equation that holds probabilistically. We demonstrate this method by attacking a five-round MISTY1 and show that it needs 2^<21.6> chosen plaintexts and 2^<28.0> encryption times. The computer simulation took about two minutes to complete.
- 社団法人電子情報通信学会の論文
- 2004-01-01
著者
-
KANEKO Toshinobu
Department of Electrical Engineering, Faculty of Science and Technology
-
HATANO Yasuo
Department of Crown and Bridge, School of Life Dentistry, the Nippon Dental University at Tokyo
-
Hatano Y
Tokyo Univ. Sci. Noda‐shi Jpn
-
TANAKA Hidema
Emergency Communications Group, Communications Research Laboratory
-
Kaneko Toshinobu
Department Of Electrical Engineering Faculty Of Science And Technology
-
Kaneko Toshinobu
Department Of Electrical Engineering Tokyo University Of Science
-
Tanaka H
Emergency Communications Group Communications Research Laboratory
-
Tanaka Hidema
Emergency Communications Group Communications Research Laboratory
-
Kaneko Toshinobu
Department Of Electric Engineering Science University Of Tokyo
-
KANEKO Toshinobu
Department of Electrical Engineering, Tokyo University of Science
関連論文
- Lowering the Error Floors of Irregular LDPC Code on Fast Fading Environment with Perfect and Imperfect CSIs(Wireless Communication Technologies)
- A Study on Higher Order Differential Attack of KASUMI(Symmetric Cryptography,Cryptography and Information Security)
- Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method
- Mapping for Iterative MMSE-SIC with Belief Propagation
- Predicting Treatment Outcome in Patient with TMD with/without Disc Reduction
- A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Optimization for the Algebraic Method and Its Application to an Attack of MISTY1 (Symmetric Cipher) (Cryptography and Information Security)
- Scheduling Algorithm with Power Allocation for Random Unitary Beamforming
- MIMO Systems in the Presence of Feedback Delay
- Optimized Linear Attack against Stream Ciphers of Pseudo Random Number Generators Using Non-linear Combiner (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Strength of Round function in RC6 Block Cipher against Higher Order Differential Attack
- The Algeblaic Degree and Security of Generalized PURE Ciphers
- Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite(Information Theory and Its Applications)
- A Study on Higher Order Differential Attack of Camellia(Special Section on Cryptography and Information Security)
- Special Section on Cryptography and Information Security
- A New Higher Order Differential of CLEFIA