Theoretical Analysis of x^2 Attack on RC6 (Symmetric Cipher) (<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we give a theoretical analysis of X^2 attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose a method of security evaluation against x^2 attack precisely including key dependency by introducing a method "Transition Matrix Computing." Previously, no theoretical security evaluation against x^2 attack was known, it has been done by computer experiments. We should note that it is the first result concerning the way of security evaluation against x^2 attack is shown theoretically.
- 社団法人電子情報通信学会の論文
- 2004-01-01
著者
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES LTD.
-
TAKENAKA MASAHIKO
FUJITSU LABORATORIES LTD
-
Takenaka Masahiko
Fujitsu Laboratories Ltd.
-
KOSHIBA Takeshi
FUJITSU LABORATORIES LTD.
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES Ltd
関連論文
- Extending Bleichenbachers Forgery Attack
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- A Practical Countermeasure against Address-bit Differential Power Analysis (特集:プライバシを保護するコンピュータセキュリティ技術)
- Design Optimization of a High-Speed, Area-Efficient and Low-Power Montgomery Modular Multiplier for RSA Algorithm(Digital, Low-Power LSI and Low-Power IP)
- Theoretical Analysis of x^2 Attack on RC6 (Symmetric Cipher) (Cryptography and Information Security)
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
- Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
- Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves
- Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
- Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)
- Extending Bleichenbacher's Forgery Attack
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160