Higher Order Differential Attack on Step-Reduced Variants of Luffa v1

被引:0
|
作者
Watanabe, Dai [1 ]
Hatano, Yasuo [1 ]
Yamada, Tsuyoshi [2 ]
Kaneko, Toshinobu [2 ]
机构
[1] Hitachi Ltd, Syst Dev Lab, Totsuka Ku, 292 Yoshida Cho, Yokohama, Kanagawa 2440817, Japan
[2] Tokyo Univ Sci, Noda, Chiba 2788510, Japan
来源
FAST SOFTWARE ENCRYPTION | 2010年 / 6147卷
关键词
Hash function; Luffa; Higher order differential attack; Non-randomness;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, a higher order differential attack on the hash function Luffa v1 is discussed. We confirmed that the algebraic degree of the permutation Q(j) which is an important non-linear component of Luffa grows slower than an ideal case both by the theoretical and the experimental approaches. According to our estimate, we can construct a distinguisher for step-reduced variants of Luffa vi up to 7 out of 8 steps by using a block message. The attack for 7 steps requires 2(216) messages. As far as we know, this is the first report which investigates the algebraic property of Luffa v1. Besides, this attack does not pose any threat to the security of the full-step of Luffa vi nor Luffa v2.
引用
收藏
页码:270 / +
页数:3
相关论文
共 50 条
  • [1] Boomerang Attack on Step-Reduced SHA-512
    Yu, Hongbo
    Bai, Dongxia
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 329 - 342
  • [2] Higher-Order Differential Properties of Keccak and Luffa
    Boura, Christina
    Canteaut, Anne
    De Canniere, Christophe
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 252 - 269
  • [3] Differential Fault Attack on Grain v1, ACORN v3 and Lizard
    Siddhanti, Akhilesh
    Sarkar, Santanu
    Maitra, Subhamoy
    Chattopadhyay, Anupam
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2017, 2017, 10662 : 247 - 263
  • [4] Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants
    Niknam, Majid M.
    Sadeghi, Sadegh
    Aref, Mohammad Reza
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (01): : 13 - 23
  • [5] Higher order differential attack using chosen higher order differences
    Moriai, S
    Shimoyama, T
    Kaneko, T
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 106 - 117
  • [6] Probabilistic higher order differential attack and higher order bent functions
    Iwata, T
    Kurosawa, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 62 - 74
  • [7] Improved Conditional Differential Attacks on Round-Reduced Grain v1
    Li, Jun-Zhi
    Guan, Jie
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4548 - 4559
  • [8] Higher order differential attack of a CAST cipher
    Moriai, S
    Shimoyama, T
    Kaneko, T
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 17 - 31
  • [9] A study on higher order differential attack of Camellia
    Kawabata, T
    Takeda, M
    Kaneko, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (01): : 31 - 36
  • [10] Higher order differential attack of Camellia(II)
    Hatano, Y
    Sekine, H
    Kaneko, T
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 129 - 146