New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256

被引:0
|
作者
Chen, Jiazhe [1 ,2 ]
Jia, Keting [3 ]
Yu, Hongbo [4 ]
Wang, Xiaoyun [1 ,2 ]
机构
[1] Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Peoples R China
[2] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
[4] Tsinghua Univ, Dept Comp Sci &Technol, Beijing 100084, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Camellia Block Cipher; Cryptanalysis; Impossible Differential; Impossible Differential Attack; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Camellia, which is a block cipher selected as a standard by ISO/IEC, is one of the most widely used block ciphers. In this paper, we propose several 6-round impossible differentials of Camellia with FL/FL-1 layers in the middle of them. With the impossible differentials and a well-organized precomputed table, impossible differential attacks on 10-round Camellia-192 and 11-round Camellia-256 are given, and the time complexities are 2(175.3) and 2(206.8) respectively. In addition, an impossible differential attack on 15-round Camellia-256 without FL/FL-1 layers and whitening is also be given, which needs about 2(236.1) encryptions. To the best of our knowledge, these are the best cryptanalytic results of Camellia-192/-256 with FL/FL-1 layers and Camellia-256 without FL/FL-1 layers to date.
引用
收藏
页码:16 / +
页数:4
相关论文
共 50 条
  • [31] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Wen, Long
    Wang, Mei-Qin
    Zhao, Jing-Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) : 165 - 176
  • [32] Differential-algebraic cryptanalysis of reduced-round of Serpent-256
    HUI Lucas C.K.
    ScienceChina(InformationSciences), 2010, 53 (03) : 546 - 556
  • [33] New attacks against reduced-round versions of IDEA
    Junod, P
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 384 - 397
  • [34] Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES
    Niu, Chao
    Li, Muzhou
    Wang, Meiqin
    Wang, Qingju
    Yiu, Siu-Ming
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 223 - 245
  • [35] Differential-algebraic cryptanalysis of reduced-round of Serpent-256
    MeiQin Wang
    XiaoYun Wang
    Lucas C.K. Hui
    Science China Information Sciences, 2010, 53 : 546 - 556
  • [36] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Long Wen
    Mei-Qin Wang
    Jing-Yuan Zhao
    Journal of Computer Science and Technology, 2014, 29 : 165 - 176
  • [37] Differential-algebraic cryptanalysis of reduced-round of Serpent-256
    Wang MeiQin
    Wang XiaoYun
    Hui, Lucas C. K.
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 546 - 556
  • [38] Differential and rectangle attacks on reduced-round SHACAL-1
    Lu, Jiqiang
    Kim, Jongsung
    Keller, Nathan
    Dunkelman, Orr
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 17 - +
  • [39] Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and SIMON
    Boura, Christina
    Naya-Plasencia, Maria
    Suder, Valentin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 179 - 199
  • [40] Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys
    Liu, Zhiqiang
    Sun, Bing
    Wang, Qingju
    Varici, Kerem
    Gu, Dawu
    IET INFORMATION SECURITY, 2016, 10 (02) : 95 - 103