The higher-order meet-in-The-middle attack and its application to the Camellia block cipher
文献类型:期刊论文
作者 | Lu, Jiqiang (1) ; Wei, Yongzhuang (2) ; Kim, Jongsung (4) ; Pasalic, Enes (5) |
刊名 | Theoretical Computer Science
![]() |
出版日期 | 2014 |
卷号 | 527页码:102-122 |
关键词 | Cryptology Block cipher Camellia Meet-in-the-middle attack Integral cryptanalysis |
ISSN号 | 3043975 |
通讯作者 | Lu, J.(lvjiqiang@hotmail.com) |
中文摘要 | The Camellia block cipher has a 128-bit block length, a user key of 128, 192 or 256 bits long, and a total of 18 rounds for a 128-bit key and 24 rounds for a 192 or 256-bit key. It is a Japanese CRYPTREC-recommended e-government cipher, a European NESSIE selected cipher and an ISO international standard. The meet-in-The-middle attack is a technique for analysing the security of a block cipher. In this paper, we propose an extension of the meet-in-The-middle attack, which we call the higher-order meet-in-The-middle (HO-MitM) attack; the core idea of the HO-MitM attack is to use multiple plaintexts to cancel some key-dependent component(s) or parameter(s) when constructing a basic unit of "value-in-The-middle". Then we introduce a novel approach, which combines integral cryptanalysis with the meet-in-The-middle attack, to construct HO-MitM attacks on 10-round Camellia with the FL/FL-1 functions under 128 key bits, 11-round Camellia with the FL/FL-1 functions under 192 key bits and 12-round Camellia with the FL/FL-1 functions under 256 key bits. Finally, we apply an existing approach to construct HO-MitM attacks on 14-round Camellia without the FL/FL-1 functions under 192 key bits and 16-round Camellia without the FL/FL-1 functions under 256 key bits. The HO-MitM attack can potentially be used to cryptanalyse other block ciphers. © 2014 Elsevier B.V. All rights reserved. |
英文摘要 | The Camellia block cipher has a 128-bit block length, a user key of 128, 192 or 256 bits long, and a total of 18 rounds for a 128-bit key and 24 rounds for a 192 or 256-bit key. It is a Japanese CRYPTREC-recommended e-government cipher, a European NESSIE selected cipher and an ISO international standard. The meet-in-The-middle attack is a technique for analysing the security of a block cipher. In this paper, we propose an extension of the meet-in-The-middle attack, which we call the higher-order meet-in-The-middle (HO-MitM) attack; the core idea of the HO-MitM attack is to use multiple plaintexts to cancel some key-dependent component(s) or parameter(s) when constructing a basic unit of "value-in-The-middle". Then we introduce a novel approach, which combines integral cryptanalysis with the meet-in-The-middle attack, to construct HO-MitM attacks on 10-round Camellia with the FL/FL-1 functions under 128 key bits, 11-round Camellia with the FL/FL-1 functions under 192 key bits and 12-round Camellia with the FL/FL-1 functions under 256 key bits. Finally, we apply an existing approach to construct HO-MitM attacks on 14-round Camellia without the FL/FL-1 functions under 192 key bits and 16-round Camellia without the FL/FL-1 functions under 256 key bits. The HO-MitM attack can potentially be used to cryptanalyse other block ciphers. © 2014 Elsevier B.V. All rights reserved. |
收录类别 | SCI ; EI |
语种 | 英语 |
WOS记录号 | WOS:000334011700008 |
公开日期 | 2014-12-16 |
源URL | [http://ir.iscas.ac.cn/handle/311060/16868] ![]() |
专题 | 软件研究所_软件所图书馆_期刊论文 |
推荐引用方式 GB/T 7714 | Lu, Jiqiang ,Wei, Yongzhuang ,Kim, Jongsung ,et al. The higher-order meet-in-The-middle attack and its application to the Camellia block cipher[J]. Theoretical Computer Science,2014,527:102-122. |
APA | Lu, Jiqiang ,Wei, Yongzhuang ,Kim, Jongsung ,&Pasalic, Enes .(2014).The higher-order meet-in-The-middle attack and its application to the Camellia block cipher.Theoretical Computer Science,527,102-122. |
MLA | Lu, Jiqiang ,et al."The higher-order meet-in-The-middle attack and its application to the Camellia block cipher".Theoretical Computer Science 527(2014):102-122. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。