A Study on Higher Order Differential Attack of KASUMI(Symmetric Cryptography,<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes novel calculuses of linearizing attack that can be applied to higher order differential attack. Higher order differential attack is a powerful and versatile attack on block ciphers. It can be roughly summarized as follows: (1) Derive an attack equation to estimate the key by using the higher order differential properties of the target cipher, (2) Determine the key by solving an attack equation. Linearizing attack is an effective method of solving attack equations. It linearizes an attack equation and determines the key by solving a system of linearized equations using approaches such as the Gauss-Jordan method. We enhance the derivation algorithm of the coefficient matrix for linearizing attack to reduce computational cost (fast calculus 1). Furthermore, we eliminate most of the unknown variables in the linearized equations by making the coefficient column vectors 0 (fast calculus 2). We apply these algorithms to an attack of the five-round variant of KASUMI and show that the attack complexity is equivalent to 2^<28.9> chosen plaintexts and 2^<31.2> KASUMI encryptions.
- 2007-01-01
著者
-
Aono Hiroshi
Network Management Development Department Ntt Docomo
-
Kaneko Toshinobu
Department Of Electrical Engineering Faculty Of Science And Technology
-
Kaneko Toshinobu
Department Of Electrical Engineering Tokyo University Of Science
-
Hongo Sadayuki
Network Management Development Department Ntt Docomo
-
Kaneko Toshinobu
Tokyo Univ. Sci. Noda‐shi Jpn
-
Kaneko Toshinobu
Tokyo Univ. Of Sci. Noda‐shi Jpn
-
SUGIO Nobuyuki
Network Management Development Department, NTT DoCoMo
-
Sugio Nobuyuki
Network Management Development Department Ntt Docomo
-
Kaneko Toshinobu
Department Of Electric Engineering Science University Of Tokyo
関連論文
- Lowering the Error Floors of Irregular LDPC Code on Fast Fading Environment with Perfect and Imperfect CSIs(Wireless Communication Technologies)
- A Study on Higher Order Differential Attack of KASUMI(Symmetric Cryptography,Cryptography and Information Security)
- Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method
- Mapping for Iterative MMSE-SIC with Belief Propagation
- A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Optimization for the Algebraic Method and Its Application to an Attack of MISTY1 (Symmetric Cipher) (Cryptography and Information Security)
- Scheduling Algorithm with Power Allocation for Random Unitary Beamforming
- MIMO Systems in the Presence of Feedback Delay
- A MAC Forgery Attack on SOBER-128(Discrete Mathematics and Its Applications)
- Strength of Round function in RC6 Block Cipher against Higher Order Differential Attack
- The Algeblaic Degree and Security of Generalized PURE Ciphers
- Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite(Information Theory and Its Applications)
- A Study on Higher Order Differential Attack of Camellia(Special Section on Cryptography and Information Security)
- Special Section on Cryptography and Information Security
- A New Higher Order Differential of CLEFIA