A new meet-in-the-middle attack on the IDEA block cipher

被引:0
|
作者
Demirci, H [1 ]
Selçuk, AA
Türe, E
机构
[1] Tubitak UEKAE, TR-41470 Gebze, Kocaeli, Turkey
[2] Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
[3] Marmara Univ, Fac Engn, Istanbul 81040, Turkey
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we introduce a novel meet-in-the-middle attack on the IDEA block cipher. The attack consists of a precomputation and an elimination phase. The attack reduces the number of required plaintexts significantly for 4 and 4.5 rounds, and, to the best of our knowledge, it is the first attack on the 5-round IDEA.
引用
收藏
页码:117 / 129
页数:13
相关论文
共 50 条
  • [1] Meet-in-the-middle attack on TWINE block cipher
    Wang, Yan-Feng
    Wu, Wen-Ling
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (10): : 2684 - 2695
  • [2] Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED
    Liu, Feng
    Liu, Xuan
    Meng, Shuai
    ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 529 - 532
  • [3] 3-subset meet-in-the-middle attack on block cipher TWIS
    Zheng, Y.-F., 1600, Editorial Board of Journal on Communications (35):
  • [4] New Meet-in-the-Middle Attacks on FOX Block Cipher
    Dong, Xiaoli
    Wei, Yongzhuang
    Gao, Wen
    Chen, Jie
    COMPUTER JOURNAL, 2023, 66 (05): : 1195 - 1212
  • [5] Improved meet-in-the-middle attack on ARIA cipher
    Institute of Cyberspace Security, The PLA Information Engineering University, Zhengzhou
    450001, China
    不详
    450001, China
    Tongxin Xuebao, 3
  • [6] Meet-in-the-middle attacks on FOX block cipher
    Li R.-J.
    Jin C.-H.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (08): : 185 - 190
  • [7] The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
    Lu, Jiqiang
    Wei, Yongzhuang
    Kim, Jongsung
    Pasalic, Enes
    THEORETICAL COMPUTER SCIENCE, 2014, 527 : 102 - 122
  • [8] Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
    Jiqiang Lu
    Wenchang Zhou
    Designs, Codes and Cryptography, 2024, 92 : 957 - 973
  • [9] Meet-in-the-Middle Attack on 11-Round 3D Block Cipher
    Li, Rongjia
    Jin, Chenhui
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (01) : 19 - 28
  • [10] Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32
    Zhang W.-Y.
    Liu F.
    Liu X.
    Meng S.
    Journal of Shanghai Jiaotong University (Science), 2013, Shanghai Jiaotong University (18): : 147 - 152