Improved meet-in-the-middle attacks on Crypton and mCrypton

被引:1
|
作者
Li, Rongjia [1 ]
Jin, Chenhui [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450000, Peoples R China
关键词
set theory; cryptography; meet-in-the-middle attacks; reduced-round Crypton block cipher; mCrypton block cipher; generalised; -set; five-round distinguishers; chosen plaintexts; encryptions; SECURITY;
D O I
10.1049/iet-ifs.2015.0518
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study presents several meet-in-the-middle attacks on reduced-round Crypton and mCrypton block ciphers. Using the generalised -set, the authors construct 5-round distinguishers on Crypton and mCrypton. Based on these distinguishers, the authors propose meet-in-the-middle attacks on 8-round Crypton and mCrypton-96/128. The attack on Crypton needs 2(121) chosen plaintexts, 2(132) encryptions and 2(130) 128-bit blocks; the attacks on mCrypton need 2(61) chosen plaintexts, 2(80) encryptions and 2(78) 64-bit blocks. Furthermore, the attack can be extended to 9 rounds for mCrypton-128 with complexities of 2(61) chosen plaintexts, 2(112) encryptions and 2(82) 64-bit blocks.
引用
收藏
页码:97 / 103
页数:7
相关论文
共 50 条
  • [21] Meet-in-the-Middle Attacks on SHA-3 Candidates
    Khovratovich, Dmitry
    Nikolic, Ivica
    Weinmann, Ralf-Philipp
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 228 - 245
  • [22] Meet-in-the-Middle Attacks on Round-Reduced Khudra
    Tolba, Mohamed
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
  • [23] Extended meet-in-the-middle attacks on some Feistel constructions
    Guo, Jian
    Jean, Jeremy
    Nikolic, Ivica
    Sasaki, Yu
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 587 - 618
  • [24] Extended meet-in-the-middle attacks on some Feistel constructions
    Jian Guo
    Jérémy Jean
    Ivica Nikolić
    Yu Sasaki
    Designs, Codes and Cryptography, 2016, 80 : 587 - 618
  • [25] A New Method for Meet-in-the-Middle Attacks on Reduced AES
    Dong Xiaoli
    Hu Yupu
    Wei Yongzhuang
    Chen Jie
    CHINA COMMUNICATIONS, 2011, 8 (02) : 21 - 25
  • [26] Massive Superpoly Recovery with a Meet-in-the-Middle Framework Improved Cube Attacks on Trivium and Kreyvium
    He, Jiahui
    Hu, Kai
    Lei, Hao
    Wang, Meiqin
    ADVANCES IN CRYPTOLOGY, PT I, EUROCRYPT 2024, 2024, 14651 : 368 - 397
  • [27] New Meet-in-the-Middle Attacks on FOX Block Cipher
    Dong, Xiaoli
    Wei, Yongzhuang
    Gao, Wen
    Chen, Jie
    COMPUTER JOURNAL, 2023, 66 (05): : 1195 - 1212
  • [28] Meet-in-the-Middle Attacks on Reduced-Round XTEA
    Sekar, Gautham
    Mouha, Nicky
    Velichkov, Vesselin
    Preneel, Bart
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
  • [29] Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
    Derbez, Patrick
    Fouque, Pierre-Alain
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 157 - 184
  • [30] Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher
    Lu, Jiqiang
    Zhou, Wenchang
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 136 - 159