A related-key attack on block ciphers with weak recurrent key schedules

作者: Marina Pudovkina

DOI: 10.1007/978-3-642-27901-0_8

关键词:

摘要: An important component of an iterated block cipher is the key schedule. In this paper, we consider ciphers with a schedule algorithm described by recurrence relation. We present efficient related-key attack on those ciphers. With regard to similar techniques, such as slide attack, our proposal considerably reduces number necessary plaintexts from O (2n /4) 2r , where r recovered round keys. The complexity is, moreover, almost equal guessing just one key.

参考文章(35)
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Advances in Cryptology - CRYPTO 2010 Lecture Notes in Computer Science. ,vol. 6223, ,(2010) , 10.1007/978-3-642-14623-7
Eli Biham, Orr Dunkelman, Nathan Keller, Improved slide attacks fast software encryption. pp. 153- 166 ,(2007) , 10.1007/978-3-540-74619-5_10
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir, Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds theory and application of cryptographic techniques. pp. 299- 319 ,(2010) , 10.1007/978-3-642-13190-5_15
Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang, Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST fast software encryption. ,vol. 3017, pp. 299- 316 ,(2004) , 10.1007/978-3-540-25937-4_19
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
John Kelsey, Bruce Schneier, David Wagner, Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA international conference on information and communication security. pp. 233- 246 ,(1997) , 10.1007/BFB0028479
Ewan Fleischmann, Michael Gorski, Stefan Lucks, Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2 Information Security Practice and Experience. pp. 310- 323 ,(2009) , 10.1007/978-3-642-00843-6_27
Orhun Kara, Reflection Cryptanalysis of Some Ciphers international conference on cryptology in india. pp. 294- 307 ,(2008) , 10.1007/978-3-540-89754-5_23