A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN

作者: Andrey Bogdanov , Christian Rechberger

DOI: 10.1007/978-3-642-19574-7_16

关键词:

摘要: In this paper we describe a variant of existing meet-in-the-middle attacks on block ciphers. As an application, propose meetin-the-middle that are applicable to the KTANTAN family ciphers accepting key 80 bits. The due some weaknesses in its bitwise schedule. We report attack time complexity 275.170 encryptions full KTANTAN32 cipher with only 3 plaintext/ciphertext pairs and well as 275.044 KTANTAN48 275.584 KTANTAN64 2 pairs. All these work classical model without any related keys. In differential related-key model, demonstrate 218- 174- round differentials holding probability 1. This shows strong property can translate successful nonrelated-key setting. Having extremely low data requirements, valid even RFID-like environments where very limited amount text material may be available attacker.

参考文章(31)
Martin Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret, Algebraic precomputations in differential and integral cryptanalysis international conference on information security and cryptology. ,vol. 6584, pp. 387- 403 ,(2010) , 10.1007/978-3-642-21518-6_27
Carlos Cid, Thomas Dulien, Martin Albrecht, Ludovic Perret, Jean-Charles Faugère, Algebraic Precomputations in Differential Cryptanalysis Tools'10: the Workshop on Tools for Cryptanalysis 2010. pp. 37- 50 ,(2010)
Jan-Hendrik Evertse, David Chaum, Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers international cryptology conference. pp. 192- 211 ,(1985)
Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee, HIGHT: a new block cipher suitable for low-resource device cryptographic hardware and embedded systems. pp. 46- 59 ,(2006) , 10.1007/11894063_4
Hüseyin Demirci, İhsan Taşkın, Mustafa Çoban, Adnan Baysal, Improved Meet-in-the-Middle Attacks on AES international conference on cryptology in india. pp. 144- 156 ,(2009) , 10.1007/978-3-642-10628-6_10
Yu Sasaki, Kazumaro Aoki, Finding Preimages in Full MD5 Faster Than Exhaustive Search international cryptology conference. pp. 134- 152 ,(2009) , 10.1007/978-3-642-01001-9_8
David Chaum, Jan-Hendrik Evertse, Cryptanalysis of DES with a reduced number of rounds international cryptology conference. pp. 192- 211 ,(1986) , 10.1007/3-540-39799-X_16
Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang, Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 international conference on the theory and application of cryptology and information security. ,vol. 6477, pp. 56- 75 ,(2010) , 10.1007/978-3-642-17373-8_4
Hüseyin Demirci, Ali Aydın Selçuk, A Meet-in-the-Middle Attack on 8-Round AES fast software encryption. pp. 116- 126 ,(2008) , 10.1007/978-3-540-71039-4_7
Steve Babbage, Matthew Dodd, The MICKEY Stream Ciphers Lecture Notes in Computer Science. pp. 191- 209 ,(2008) , 10.1007/978-3-540-68351-3_15