Impossible differential attack on 13-round Camellia-192

被引:8
|
作者
Blondeau, Celine [1 ]
机构
[1] Aalto Univ, Sch Sci, Dept Informat & Comp Sci, Espoo, Finland
关键词
Cryptography; Impossible differential; Camellia; CRYPTANALYSIS;
D O I
10.1016/j.ipl.2015.03.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the security of the block ciphers Camellia-192 and Camellia-256 in the impossible differential context. In particular, we present the first attack on 13 rounds of Camellia-192 with FL/FL-1 layers. An attack on 14 rounds of Camellia-256 requiring less complexity than the previous impossible differential attacks is also described. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:660 / 666
页数:7
相关论文
共 50 条
  • [1] New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
    Chen, Jiazhe
    Jia, Keting
    Yu, Hongbo
    Wang, Xiaoyun
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 16 - +
  • [2] Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256
    Liu, Ya
    Gu, Dawu
    Liu, Zhiqiang
    Li, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (11) : 2451 - 2458
  • [3] Impossible Differential Attacks on 13-Round CLEFIA-128
    Hamid Mala
    Mohammad Dakhilalian
    Mohsen Shakiba
    Journal of Computer Science & Technology, 2011, 26 (04) : 744 - 750
  • [4] Impossible Differential Attacks on 13-Round CLEFIA-128
    Hamid Mala
    Mohammad Dakhilalian
    Mohsen Shakiba
    Journal of Computer Science and Technology, 2011, 26 : 744 - 750
  • [5] Impossible Differential Attacks on 13-Round CLEFIA-128
    Hamid Mala
    Mohammad Dakhilalian
    Mohsen Shakiba
    Journal of Computer Science & Technology, 2011, (04) : 744 - 750
  • [6] Impossible Differential Attacks on 13-Round CLEFIA-128
    Mala, Hamid
    Dakhilalian, Mohammad
    Shakiba, Mohsen
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 744 - 750
  • [7] Impossible differential cryptanalysis of 13-round CLEFIA-128
    Tang, Xuehai
    Sun, Bing
    Li, Ruilin
    Li, Chao
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (07) : 1191 - 1196
  • [8] New Impossible Differential Cryptanalysis of Reduced-Round Camellia
    Li, Leibo
    Chen, Jiazhe
    Jia, Keting
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 26 - +
  • [9] Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
    吴文玲
    张文涛
    冯登国
    Journal of Computer Science & Technology, 2007, (03) : 449 - 456
  • [10] Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
    Wen-Ling Wu
    Wen-Tao Zhang
    Deng-Guo Feng
    Journal of Computer Science and Technology, 2007, 22 : 449 - 456