Impossible differential attacks on FOX

被引:0
|
作者
Wei, Yue-Chuan [1 ]
Sun, Bing [2 ]
Li, Chao [1 ,2 ,3 ]
机构
[1] College of Computer, National University of Defense Technology, Changsha 410073, China
[2] Science College, National University of Defense Technology, Changsha 410073, China
[3] State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing 100049, China
来源
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Some 4-round impossible differentials were found by means of meet-in-the-middle. By using impossible differential cryptanalysis methods and time-memory balanced technique, the results of previous attacks on FOX cipher were improved. The experiment results show that For FOX64, 5-round attack needs 239 chosen plaintexts and 268 encryptions, 6-round attack needs 256 chosen plaintexts and 2133 encryptions, 7-round needs 256 and 2213. For FOX128, 5-round attack needs 272 chosen plaintexts and 2134 encryptions. Therefore, 7-round FOX64/256 and 5-round FOX128/192/256 are not immune to impossible differential attack.
引用
收藏
页码:24 / 29
相关论文
共 50 条
  • [21] Impossible Differential Attacks on 13-Round CLEFIA-128
    Hamid Mala
    Mohammad Dakhilalian
    Mohsen Shakiba
    Journal of Computer Science and Technology, 2011, 26 : 744 - 750
  • [22] Impossible Differential Attacks on 13-Round CLEFIA-128
    Mala, Hamid
    Dakhilalian, Mohammad
    Shakiba, Mohsen
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 744 - 750
  • [23] Impossible Differential Attacks on 13-Round CLEFIA-128
    Hamid Mala
    Mohammad Dakhilalian
    Mohsen Shakiba
    Journal of Computer Science & Technology, 2011, (04) : 744 - 750
  • [24] A Note on the Impossible Differential Attacks on Block Cipher SM4
    Chen, Jiazhe
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 551 - 554
  • [25] On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
    Kondo, Kota
    Sasaki, Yu
    Todo, Yosuke
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 88 - 98
  • [26] On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
    Kondo, Kota
    Sasaki, Yu
    Iwata, Tetsu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 518 - 536
  • [27] Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and SIMON
    Boura, Christina
    Naya-Plasencia, Maria
    Suder, Valentin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 179 - 199
  • [28] Impossible Boomerang Attacks Revisited
    Zhang, Jianing
    Wang, Haoyang
    Tang, Deng
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (02) : 254 - 295
  • [29] A New Result of Impossible Differential Attacks on 7-Round AES-192
    Liu Jingmei
    Zhao Linsen
    Wang Xinmei
    CHINA COMMUNICATIONS, 2009, 6 (3A) : 111 - 115
  • [30] Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
    Chakraborty, Debasmita
    Hadipour, Hosein
    Nguyen, Phuong Hoa
    Eichlseder, Maria
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (03) : 84 - 176