Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
スポンサーリンク
概要
- 論文の詳細を見る
MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper shows that higher order differential attacks can be successful against 7-round versions of MISTY1 with FL functions. The attack on 7-round MISTY1 can recover a partial subkey with a data complexity of 254.1 and a computational complexity of 2120.8, which signifies the first successful attack on 7-round MISTY1 with no limitation such as a weak key. This paper also evaluates the complexity of this higher order differential attack on MISTY1 in which the key schedule is replaced by a pseudorandom function. It is shown that resistance to the higher order differential attack is not substantially improved even in 7-round MISTY1 in which the key schedule is replaced by a pseudorandom function.
著者
-
TSUNOO Yukiyasu
NEC Corporation
-
SAITO Teruo
NEC Software Hokuriku, Ltd.
-
SHIGERI Maki
NEC Software Hokuriku, Ltd.
-
KAWABATA Takeshi
NEC Software Hokuriku, Ltd.
関連論文
- Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
- Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV
- A low-cost LSI design of AES against DPA attack by hiding power information (第21回 回路とシステム軽井沢ワークショップ論文集) -- (実現技術)
- An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
- Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV
- Results of Linear Cryptanalysis Using Linear Sieve Methods
- Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
- Higher Order Differential Attack on 6-Round MISTY1
- Finding Higher Order Differentials of MISTY1
- Finding Higher Order Differentials of MISTY1