Related-key rectangle attack on 36 rounds of the XTEA block cipher

被引:0
|
作者
Jiqiang Lu
机构
[1] University of London,Information Security Group, Royal Holloway
关键词
Block cipher; XTEA; Related-key rectangle attack;
D O I
暂无
中图分类号
学科分类号
摘要
XTEA is a 64-round block cipher with a 64-bit block size and a 128-bit user key, which was designed as a short C program that would run safely on most computers. In this paper, we present a related-key rectangle attack on a series of inner 36 rounds of XTEA without making a weak key assumption, and a related-key rectangle attack on the first 36 rounds of XTEA under certain weak key assumptions. These are better than any previously published cryptanalytic results on XTEA in terms of the numbers of attacked rounds.
引用
收藏
页码:1 / 11
页数:10
相关论文
共 50 条
  • [31] Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks
    Kim, Jongsung
    Park, Jong Hyuk
    Kim, Young-Gon
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 157 - +
  • [32] Critique of the related-key attack concept
    David G. Harris
    Designs, Codes and Cryptography, 2011, 59 : 159 - 168
  • [33] Related-Key Attack on the Full HIGHT
    Koo, Bonwook
    Hong, Deukjo
    Kwon, Daesung
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 49 - 67
  • [34] Critique of the related-key attack concept
    Harris, David G.
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 59 (1-3) : 159 - 168
  • [35] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model
    Chen, Jiageng
    Miyaji, Atsuko
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 62 - 76
  • [36] Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN
    Aumasson, Jean-Philippe
    Naya-Plasencia, Maria
    Saarinen, Markku-Juhani O.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 134 - 145
  • [37] On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
    Albrecht, M. R.
    Farshim, P.
    Paterson, K. G.
    Watson, G. J.
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 128 - 145
  • [38] A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules
    Lee, Jung-Keun
    Koo, Bonwook
    Kim, Woo-Hwan
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 194 - 224
  • [39] Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 224 - 230
  • [40] Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
    Kim, Jongsung
    Hong, Seokhie
    Preneel, Bart
    Biham, Eli
    Dunkelman, Orr
    Keller, Nathan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (07) : 4948 - 4966