Related-key rectangle attack on 36 rounds of the XTEA block cipher

被引:0
|
作者
Jiqiang Lu
机构
[1] University of London,Information Security Group, Royal Holloway
关键词
Block cipher; XTEA; Related-key rectangle attack;
D O I
暂无
中图分类号
学科分类号
摘要
XTEA is a 64-round block cipher with a 64-bit block size and a 128-bit user key, which was designed as a short C program that would run safely on most computers. In this paper, we present a related-key rectangle attack on a series of inner 36 rounds of XTEA without making a weak key assumption, and a related-key rectangle attack on the first 36 rounds of XTEA under certain weak key assumptions. These are better than any previously published cryptanalytic results on XTEA in terms of the numbers of attacked rounds.
引用
收藏
页码:1 / 11
页数:10
相关论文
共 50 条
  • [1] Related-key rectangle attack on 36 rounds of the XTEA block cipher
    Lu, Jiqiang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (01) : 1 - 11
  • [2] A weak key class of XTEA for a related-key rectangle attack
    Lee, Eunjin
    Hong, Deukjo
    Chang, Donghoon
    Hong, Seokhie
    Lim, Jongin
    PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 286 - +
  • [3] Attacking 44 rounds of the SHACAL-2 block cipher using related-key rectangle cryptanalysis
    Lu, Jiqiang
    Kim, Jongsung
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09): : 2588 - 2596
  • [4] Related-Key Boomerang Attack on Block Cipher SQUARE
    Koo, Bonwook
    Yeom, Yongjin
    Song, Junghwan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 3 - 9
  • [5] Related-Key Rectangle Cryptanalysis of Reduced-Round Block Cipher MIBS
    Qiao, Kexin
    Hu, Lei
    Sun, Siwei
    Ma, Xiaoshuang
    2015 9TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2015, : 216 - 220
  • [6] Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher
    Fleischmann, Ewan
    Gorski, Michael
    Lucks, Stefan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 298 - 309
  • [7] A related-key rectangle attack on the full KASUMI
    Biham, E
    Dunkelman, O
    Keller, N
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 443 - 461
  • [8] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Lu, Jiqiang
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 60 (02) : 123 - 143
  • [9] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Jiqiang Lu
    Designs, Codes and Cryptography, 2011, 60 : 123 - 143
  • [10] Related-key rectangle attack on MD-64
    Science and Technology on Information Assurance Laboratory, Beijing
    100072, China
    不详
    450001, China
    不详
    611830, China
    Dianzi Yu Xinxi Xuebao, 12 (2845-2851):