Impossible Differential Cryptanalysis of reduced-round TEA and XTEA

被引:0
|
作者
Hajari, Masroor [1 ]
Azimi, Seyyed Arash [1 ]
Aghdaie, Poorya [2 ]
Salmasizadeh, Mahmoud [3 ]
Aref, Mohammad Reza [4 ]
机构
[1] Sharif Univ Technol, Informat Syst & Secur Lab, Tehran, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[3] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
[4] Sharif Univ Technol, Dept Elect Engn, Informat Syst & Secur Lab, Tehran, Iran
关键词
Impossible Differential Cryptanalysis; Lightweight; Block Cipher; TEA; XTEA; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
TEA and XTEA are two lightweight Feistel block ciphers, each of which has a block size of 64 bits and a key size of 128 bits. These two ciphers have ARX structure, i.e. their round functions consist of modular addition, shift and XOR to be exact. Since each operation of TEA and XTEA can be done in a bitwise fashion, we are able to use early abort technique in the impossible differential attack that helps us to remove inappropriate pairs as soon as possible, hence decreasing time complexity. In this paper we present two new 15-round impossible differential characteristics, resulting in the first known impossible differential cryptanalysis mounted on 19 rounds of TEA and 25 rounds of XTEA.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [31] Cryptanalysis of Reduced-Round DASH
    Shu-Sheng Liu
    Zheng Gong
    Li-Bin Wang
    Journal of Computer Science and Technology, 2013, 28 : 159 - 164
  • [32] Cryptanalysis of Reduced-Round DASH
    Liu, Shu-Sheng
    Gong, Zheng
    Wang, Li-Bin
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (01) : 159 - 164
  • [33] New impossible differential attacks on reduced-round Crypton
    Mala, Hamid
    Shakiba, Mohsen
    Dakhilalian, Mohammad
    COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) : 222 - 227
  • [34] Meet-in-the-Middle Attacks on Reduced-Round XTEA
    Sekar, Gautham
    Mouha, Nicky
    Velichkov, Vesselin
    Preneel, Bart
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
  • [35] Differential and linear cryptanalysis of a reduced-round SC2000
    Yanami, H
    Shimoyama, T
    Dunkelman, O
    FAST SOFTWARE ENCRYPTION (REVISED PAPERS), 2002, 2365 : 34 - 48
  • [36] Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon
    Courtois, Nicolas
    Mourouzis, Theodosis
    Song, Guangyan
    Sepehrdad, Pouyan
    Susil, Petr
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 399 - 404
  • [37] Integral Cryptanalysis of Reduced-round KASUMI
    Sugio, Nobuyuki
    Igarashi, Yasutaka
    Kaneko, Toshinobu
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 447 - 451
  • [38] Integral Cryptanalysis on Reduced-Round KASUMI
    Sugio, Nobuyuki
    Igarashi, Yasutaka
    Hongo, Sadayuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (09) : 1309 - 1316
  • [39] Integral cryptanalysis on reduced-round PUFFIN
    Zhao, Guangyao
    Cheng, Lei
    Li, Ruilin
    Li, Chao
    Sun, Bing
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2015, 37 (06): : 129 - 134
  • [40] Integral Cryptanalysis on Reduced-round KASUMI
    Sugio, Nobuyuki
    Igarashi, Yasutaka
    Kaneko, Toshinobu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)