Impossible differential attacks on FOX

被引:0
|
作者
Wei, Yue-Chuan [1 ]
Sun, Bing [2 ]
Li, Chao [1 ,2 ,3 ]
机构
[1] College of Computer, National University of Defense Technology, Changsha 410073, China
[2] Science College, National University of Defense Technology, Changsha 410073, China
[3] State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing 100049, China
来源
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Some 4-round impossible differentials were found by means of meet-in-the-middle. By using impossible differential cryptanalysis methods and time-memory balanced technique, the results of previous attacks on FOX cipher were improved. The experiment results show that For FOX64, 5-round attack needs 239 chosen plaintexts and 268 encryptions, 6-round attack needs 256 chosen plaintexts and 2133 encryptions, 7-round needs 256 and 2213. For FOX128, 5-round attack needs 272 chosen plaintexts and 2134 encryptions. Therefore, 7-round FOX64/256 and 5-round FOX128/192/256 are not immune to impossible differential attack.
引用
收藏
页码:24 / 29
相关论文
共 50 条
  • [41] Impossible differential cryptanalysis of zodiac
    Hong, D
    Sung, J
    Moriai, S
    Lee, S
    Lim, J
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 300 - 311
  • [42] Impossible differential cryptanalysis of Zodiac
    Hong, D
    Sung, J
    Moriai, S
    Lee, SJ
    Lim, JG
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01) : 38 - 43
  • [43] Impossible Differential Cryptanalysis of Surge
    Qu, Zhiqiang
    Shen, Xuan
    He, Jun
    2019 5TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2020, 440
  • [44] Impossible Differential Cryptanalysis of BORON
    Wu, Xiao-Nian
    Li, Ying-Xin
    Li, Ling-Chen
    Wei, Yong-Zhuang
    Zhang, Run-Lian
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022, 38 (04) : 805 - 819
  • [45] Impossible Differential Cryptanalysis of CLEFIA
    Tsunoo, Yukiyasu
    Tsujihara, Etsuko
    Shigeri, Maki
    Saito, Teruo
    Suzaki, Tomoyasu
    Kubo, Hiroyasu
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 398 - +
  • [46] Meet-in-the-middle attacks on FOX block cipher
    Li R.-J.
    Jin C.-H.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (08): : 185 - 190
  • [47] An improved impossible differential cryptanalysis of Zodiac
    Shakiba, Mohsen
    Dakhilalian, Mohammad
    Mala, Hamid
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (04) : 702 - 709
  • [48] On computational complexity of impossible differential cryptanalysis
    Shakiba, Mohsen
    Dakhilalian, Mohammad
    Mala, Hamid
    INFORMATION PROCESSING LETTERS, 2014, 114 (05) : 252 - 255
  • [49] Impossible differential cryptanalysis of Saturnin algorithm
    Jiang, Zilong
    Jin, Chenhui
    Tongxin Xuebao/Journal on Communications, 2022, 43 (03): : 53 - 62
  • [50] Improved impossible differential cryptanalysis of ARIA
    Li, Shenhua
    Song, Chunyan
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 129 - +