The Security of RC6 against Asymmetric Chi-square Test Attack
スポンサーリンク
概要
- 論文の詳細を見る
Knudsen and Meier applied the χ2-attack to RC6. The χ2-attack recovers a key by using high correlations measured by χ2-value. The best χ2-attacks to RC6 whose security is guaranteed theoretically works on 16-round RC6 with 192- and 256-bit key but just 8-round RC6 with 128-bit key, because it recovers keys of RC6 symmetrically, which requires a time complexity of #plaintexts × 254 and a memory complexity of 280 for recovering one key. In this paper, we improve the χ2-attack to reduce the time complexity. We give the theorem that evaluates the success probability of the χ2-attack on RC6 without using any experimental result. Our key recovery attack recovers keys asymmetrically, which requires a time complexity of #plaintexts × 231 and a memory complexity of 252 for recovering one key. As a result, our key recovery attack works on 16-round RC6 with 192- and 256-bit key and 12-round RC6 with 128-bit key. In the case both of 196- and 256-bit keys, our attack surprisingly reduces the time and memory complexity compared with that of the previous attack. We also demonstrate our theorem on RC6-8/4/8 and make sure of the accuracy by comparing our approximation with the experimental results.
- Information and Media Technologies 編集運営会議の論文
著者
-
HINOUE TOMOHIKO
Japan Advanced Institute Science and Technology
-
WADA TAKATOMI
Japan Advanced Institute Science and Technology
-
Miyaji Atsuko
Japan Advanced Inst. Of Sci. And Technol.
関連論文
- The security of RC6 against asymmetric Chi-square test attack
- Evaluation of the Security of RC6 against the χ^2-Attack
- Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- A Second-price Sealed-bid Auction with Public Verifiability
- An Anonymous Sealed-bid Auction with a Feature of Entertainment
- Software Obfuscation on a Theoretical Basis and Its Implementation
- Statistical Analysis of chi-square Attacks
- Cryptanalysis of Reduced-Round RC6 without Whitening
- Improved Correlation Attack on RC5
- A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
- New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
- Efficient Construction of Elliptic Curves over Optimal Extension Field
- Sequential Bitwise Sanitizable Signature Schemes
- Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point
- New Concrete Relation between Trace, Definition Field, and Embedding Degree
- Efficinet Group Signature Scheme Based on a Modified Nyberg-Rueppel Signature (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
- Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- Secure Dynamic Hourglass Protocol for Untrusted Server