Collision attack on reduced-round Camellia

被引:3
|
作者
Wu, WL [1 ]
Feng, DG [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
block cipher; collision attack; key; data complexity; time complexity;
D O I
10.1360/03yf0293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers; are used to attack on 6, 7, 8 and 9 rounds of Camellia with 128-bit key and 8, 9 and 10 rounds of Camellia with 192/256-bit key. The 128-bit key of 6 rounds Camellia can be recovered with 2(10) chosen plaintexts and 2(15) encryptions. The 128-bit key of 7 rounds Camellia can be recovered with 2(12) chosen plaintexts and 2(54.5) encryptions. The 128-bit key of 8 rounds Camellia can be recovered with 2(13) chosen plaintexts and 2(112.1) encryptions. The 128-bit key of 9 rounds Camellia can be recovered with 2(113.6) chosen plaintexts and 2(121) encryptions. The 192/256-bit key of 8 rounds Camellia can be recovered with 2(13) chosen plaintexts and 2(111.1) encryptions. The 192/256-bit key of 9 rounds Camellia can be recovered with 2 13 chosen plaintexts and 2 175,6 encryptions. The 256-bit key of 10 rounds Camellia can be recovered with 2(14) chosen plaintexts and 2(239.9) encryptions.
引用
收藏
页码:78 / 90
页数:13
相关论文
共 50 条
  • [1] Collision attack on reduced-round Camellia
    WU Wenling & FENG Dengguo State Key Laboratory of Information Security
    ScienceinChina(SeriesF:InformationSciences), 2005, (01) : 78 - 90
  • [2] Collision attack on reduced-round Camellia
    Wenling Wu
    Dengguo Feng
    Science in China Series F: Information Sciences, 2005, 48 : 78 - 90
  • [3] Collision attack and pseudorandomness of reduced-round Camellia
    Wu, WL
    Feng, DG
    Chen, H
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 252 - 266
  • [4] The Square Attack of Reduced-Round Camellia
    Yu, Xiaoli
    Wei, Hongru
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 244 - 247
  • [5] Improved collision attack on reduced round Camellia
    Guan Jie
    Zhang Zhongya
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 182 - +
  • [6] A Cube Attack on a Reduced-Round Sycon
    Cho, Minjeong
    Eom, Hyejin
    Tcydenova, Erzhena
    Lee, Changhoon
    ELECTRONICS, 2022, 11 (21)
  • [7] Structural Attack on Reduced-Round Skipjack
    Zhang, Jiyan
    Cui, Ting
    Jin, Chenhui
    IEEE ACCESS, 2018, 6 : 3176 - 3183
  • [8] Cube Attack on Reduced-Round Quavium
    Zhang, Shiyong
    Chen, Gongliang
    Li, Jianhua
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 135 - 139
  • [9] Integral Attack on Reduced-Round RECTANGLE
    Kosuge, Haruhisa
    Tanaka, Hidema
    Iwai, Keisuke
    Kurokawa, Takakazu
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 68 - 73
  • [10] Impossible differential cryptanalysis of reduced-round ARIA and Camellia
    Wu, Wen-Ling
    Zhang, Wen-Tao
    Feng, Deng-Guo
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (03) : 449 - 456