Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers

作者: Yu Sasaki , Lei Wang

DOI: 10.1007/978-3-642-35999-6_16

关键词:

摘要: In this paper, an improvement for integral attacks against Feistel ciphers is discussed. The new technique can reduce the complexity of key recovery phase. This possibly leads to extension number attacked rounds. attack, attacker guesses a part round keys and performs partial decryption. correctness guess judged by examining whether XOR sum results becomes 0 or not. it shown that computation decryptions be divided into two independent parts if analysis target adopts network its variant. Then, correct candidates are efficiently obtained with meet-in-the-middle approach. effect our demonstrated several ciphers. Improvements on LBlock, HIGHT, CLEFIA presented. Particularly, rounds extended LBlock.

参考文章(38)
Progress in Cryptology - INDOCRYPT 2010 Lecture Notes in Computer Science. ,vol. 6498, ,(2010) , 10.1007/978-3-642-17401-8
Wenling Wu, Lei Zhang, LBlock: a lightweight block cipher applied cryptography and network security. pp. 327- 344 ,(2011) , 10.1007/978-3-642-21554-4_19
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Joan Daemen, Vincent Rijmen, The Advanced Encryption Standard Process Information Security and Cryptography. pp. 1- 8 ,(2002) , 10.1007/978-3-662-04722-4_1
Jiazhe Chen, Meiqin Wang, Bart Preneel, Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT Progress in Cryptology - AFRICACRYPT 2012. pp. 117- 137 ,(2012) , 10.1007/978-3-642-31410-0_8
Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann, Analysis of the SMS4 Block Cipher Information Security and Privacy. pp. 158- 170 ,(2007) , 10.1007/978-3-540-73458-1_13
Andrey Bogdanov, Christian Rechberger, A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN international conference on selected areas in cryptography. ,vol. 6544, pp. 229- 240 ,(2010) , 10.1007/978-3-642-19574-7_16
Yongjin Yeom, Sangwoo Park, Iljun Kim, On the Security of CAMELLIA against the Square Attack fast software encryption. pp. 89- 99 ,(2002) , 10.1007/3-540-45661-9_7
Lei Duo, Chao Li, Keqin Feng, Square Like Attack on Camellia Information and Communications Security. ,vol. 4861, pp. 269- 283 ,(2007) , 10.1007/978-3-540-77048-0_21