Statistical Analysis of chi-square Attacks
スポンサーリンク
概要
- 論文の詳細を見る
The χ^2-attack was originally proposed by Knudsen and Meier. This attack is one of the most effective attacks for RC6. The χ^2-attack can be used for both distinguishing attacks and for key recovery attacks. Although, up to the present, theoretical analysis of χ^2-attacks, especially the relation between a distinguishing attack and a key recovery attack, has not been discussed, the security against key recovery attacks has been often discussed by the results of distinguishing attacks. In this paper, we investigate the theoretical relation between the distinguishing attack and the key recovery attack, and prove one theorem to evaluate the exact security against the key recovery attacks by using the results of the distinguishing attack. Furthermore we propose two key recovery attacks against RC5-64 and implement them. Our best key recovery attack can analyze RC5-64 with 16 rounds by using 2^<125.23> plaintexts with a success probability of 30%. This result works faster than exhaustive key search. As far as the authors know, this is the best result of known plaintext attacks to RC5-64. We also apply our theory on our key recovery attacks and demonstrate the validity.
- 2003-05-01
著者
-
MIYAJI Atsuko
Japan Advanced Institute of Science and Technology
-
Nonaka Masao
Matsushita Electric Industrial Co. Ltd
-
ISOGAI Norihisa
Japan Advanced Institute of Science and Technology
-
Miyaji Atsuko
Japan Advanced Inst. Of Sci. And Technol. Ishikawa‐ken Jpn
-
Miyaji Atsuko
Japan Advanced Inst. Of Sci. And Technol.
関連論文
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- Sequential Bitwise Sanitizable Signature Schemes
- Generalized Scalar Multiplication Secure against SPA, DPA, and RPA
- The security of RC6 against asymmetric Chi-square test attack
- Evaluation of the Security of RC6 against the χ^2-Attack
- Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- A Second-price Sealed-bid Auction with Public Verifiability
- An Anonymous Sealed-bid Auction with a Feature of Entertainment
- Software Obfuscation on a Theoretical Basis and Its Implementation
- Statistical Analysis of chi-square Attacks
- Cryptanalysis of Reduced-Round RC6 without Whitening
- Improved Correlation Attack on RC5
- A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
- New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
- Efficient Construction of Elliptic Curves over Optimal Extension Field
- Sequential Bitwise Sanitizable Signature Schemes
- Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point
- New Concrete Relation between Trace, Definition Field, and Embedding Degree
- Efficinet Group Signature Scheme Based on a Modified Nyberg-Rueppel Signature (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
- Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- Secure Dynamic Hourglass Protocol for Untrusted Server