Narrow-Bicliques: Cryptanalysis of Full IDEA

作者: Dmitry Khovratovich , Gaëtan Leurent , Christian Rechberger

DOI: 10.1007/978-3-642-29011-4_24

关键词:

摘要: We apply and extend the recently introduced biclique framework to IDEA for first time describe an approach noticeably speed-up key-recovery full 8.5 round IDEA. We also show that block cipher cryptanalysis not only obtains results on more rounds, but improves data complexities over existing attacks. consider 7.5 rounds of demonstrate a variant works with practical complexity. The conceptual contribution is narrow-bicliques technique: independent-biclique extended ways allow significantly reduced complexity everything else being equal. For this we use available degrees freedom as known from hash narrow relevant differential trails. Our high computational complexity, does threaten in any way, yet techniques are practically verified large extent.

参考文章(43)
Progress in Cryptology - INDOCRYPT 2010 Lecture Notes in Computer Science. ,vol. 6498, ,(2010) , 10.1007/978-3-642-17401-8
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque, Automatic search of attacks on round-reduced AES and applications international cryptology conference. ,vol. 2012, pp. 169- 187 ,(2011) , 10.1007/978-3-642-22792-9_10
Andrey Bogdanov, Christian Rechberger, A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN international conference on selected areas in cryptography. ,vol. 6544, pp. 229- 240 ,(2010) , 10.1007/978-3-642-19574-7_16
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Xiaorui Sun, Xuejia Lai, The Key-Dependent Attack on Block Ciphers international conference on the theory and application of cryptology and information security. pp. 19- 36 ,(2009) , 10.1007/978-3-642-10366-7_2
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, Biclique cryptanalysis of the full AES international conference on the theory and application of cryptology and information security. ,vol. 7073, pp. 344- 371 ,(2011) , 10.1007/978-3-642-25385-0_19
Jan-Hendrik Evertse, David Chaum, Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers international cryptology conference. pp. 192- 211 ,(1985)
Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams, Secure Two-Party Computation Is Practical international conference on the theory and application of cryptology and information security. pp. 250- 267 ,(2009) , 10.1007/978-3-642-10366-7_15
Carolyn Whitnall, Elisabeth Oswald, A comprehensive evaluation of mutual information analysis using a fair evaluation framework international cryptology conference. ,vol. 2011, pp. 316- 334 ,(2011) , 10.1007/978-3-642-22792-9_18