Improved meet-in-the-middle attacks on Crypton and mCrypton

被引:1
|
作者
Li, Rongjia [1 ]
Jin, Chenhui [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450000, Peoples R China
关键词
set theory; cryptography; meet-in-the-middle attacks; reduced-round Crypton block cipher; mCrypton block cipher; generalised; -set; five-round distinguishers; chosen plaintexts; encryptions; SECURITY;
D O I
10.1049/iet-ifs.2015.0518
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study presents several meet-in-the-middle attacks on reduced-round Crypton and mCrypton block ciphers. Using the generalised -set, the authors construct 5-round distinguishers on Crypton and mCrypton. Based on these distinguishers, the authors propose meet-in-the-middle attacks on 8-round Crypton and mCrypton-96/128. The attack on Crypton needs 2(121) chosen plaintexts, 2(132) encryptions and 2(130) 128-bit blocks; the attacks on mCrypton need 2(61) chosen plaintexts, 2(80) encryptions and 2(78) 64-bit blocks. Furthermore, the attack can be extended to 9 rounds for mCrypton-128 with complexities of 2(61) chosen plaintexts, 2(112) encryptions and 2(82) 64-bit blocks.
引用
收藏
页码:97 / 103
页数:7
相关论文
共 50 条
  • [41] Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
    Nobuyuki, Sugio
    IET INFORMATION SECURITY, 2023, 2023 (01)
  • [42] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 121 - 130
  • [43] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 378 - 396
  • [44] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
    Abdelkhalek, Ahmed
    AlTawy, Riham
    Tolba, Mohamed
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203
  • [45] Meet-in-the-middle attacks on 10-round AES-256
    Li, Rongjia
    Jin, Chenhui
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 459 - 471
  • [46] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    JOURNAL OF CRYPTOLOGY, 2020, 33 (03) : 1184 - 1215
  • [47] Meet-in-the-middle attacks on 10-round AES-256
    Rongjia Li
    Chenhui Jin
    Designs, Codes and Cryptography, 2016, 80 : 459 - 471
  • [48] Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256
    Akshima
    Chang, Donghoon
    Ghosh, Mohona
    Goel, Aarushi
    Sanadhya, Somitra Kumar
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 9462 : 198 - 217
  • [49] Differential Meet-In-The-Middle Cryptanalysis
    Boura, Christina
    David, Nicolas
    Derbez, Patrick
    Leander, Gregor
    Naya-Plasencia, Maria
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 240 - 272
  • [50] Meet-in-the-middle Cryptanalysis of IVLBC
    Uchiyama, Yuki
    Igarashi, Yasutaka
    2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 445 - 450