Higher Order Differential Attack on Step-Reduced Variants of Luffa v1

被引:0
|
作者
Watanabe, Dai [1 ]
Hatano, Yasuo [1 ]
Yamada, Tsuyoshi [2 ]
Kaneko, Toshinobu [2 ]
机构
[1] Hitachi Ltd, Syst Dev Lab, Totsuka Ku, 292 Yoshida Cho, Yokohama, Kanagawa 2440817, Japan
[2] Tokyo Univ Sci, Noda, Chiba 2788510, Japan
来源
FAST SOFTWARE ENCRYPTION | 2010年 / 6147卷
关键词
Hash function; Luffa; Higher order differential attack; Non-randomness;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, a higher order differential attack on the hash function Luffa v1 is discussed. We confirmed that the algebraic degree of the permutation Q(j) which is an important non-linear component of Luffa grows slower than an ideal case both by the theoretical and the experimental approaches. According to our estimate, we can construct a distinguisher for step-reduced variants of Luffa vi up to 7 out of 8 steps by using a block message. The attack for 7 steps requires 2(216) messages. As far as we know, this is the first report which investigates the algebraic property of Luffa v1. Besides, this attack does not pose any threat to the security of the full-step of Luffa vi nor Luffa v2.
引用
收藏
页码:270 / +
页数:3
相关论文
共 50 条
  • [21] Strength of MISTY1 without FL function for higher order differential attack
    Tanaka, H
    Hisamatsu, K
    Kaneko, T
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 1999, 1719 : 221 - 230
  • [22] Higher Order Differential Attacks on Reduced-Round MISTY1
    Tsunoo, Yukiyasu
    Saito, Teruo
    Shigeri, Maki
    Kawabata, Takeshi
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 415 - +
  • [23] Improving the higher order differential attack and cryptanalysis of the KN cipher
    Shimoyama, T
    Moriai, S
    Kaneko, T
    INFORMATION SECURITY, 1998, 1396 : 32 - 42
  • [24] Improved conditional differential attacks on Grain v1
    Ma, Zhen
    Tian, Tian
    Qi, Wen-Feng
    IET INFORMATION SECURITY, 2017, 11 (01) : 46 - 53
  • [25] Some Insights into Differential Cryptanalysis of Grain v1
    Banik, Subhadeep
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 34 - 49
  • [26] Fast Near Collision Attack on the Grain v1 Stream Cipher
    Zhang, Bin
    Xu, Chao
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 771 - 802
  • [27] Correlations in V1 Are Reduced by Stimulation Outside the Receptive Field
    Snyder, Adam C.
    Morais, Michael J.
    Kohn, Adam
    Smith, Matthew A.
    JOURNAL OF NEUROSCIENCE, 2014, 34 (34): : 11222 - 11227
  • [28] Figure-Ground Processing during Fixational Saccades in V1: Indication for Higher-Order Stability
    Gilad, Ariel
    Pesoa, Yair
    Ayzenshtat, Inbal
    Slovin, Hamutal
    JOURNAL OF NEUROSCIENCE, 2014, 34 (09): : 3247 - 3252
  • [29] Conditional differential cryptanalysis of 105 round Grain v1
    Subhadeep Banik
    Cryptography and Communications, 2016, 8 : 113 - 137
  • [30] Conditional differential cryptanalysis of 105 round Grain v1
    Banik, Subhadeep
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2016, 8 (01): : 113 - 137