Related-key rectangle attack on 36 rounds of the XTEA block cipher

被引:0
|
作者
Jiqiang Lu
机构
[1] University of London,Information Security Group, Royal Holloway
关键词
Block cipher; XTEA; Related-key rectangle attack;
D O I
暂无
中图分类号
学科分类号
摘要
XTEA is a 64-round block cipher with a 64-bit block size and a 128-bit user key, which was designed as a short C program that would run safely on most computers. In this paper, we present a related-key rectangle attack on a series of inner 36 rounds of XTEA without making a weak key assumption, and a related-key rectangle attack on the first 36 rounds of XTEA under certain weak key assumptions. These are better than any previously published cryptanalytic results on XTEA in terms of the numbers of attacked rounds.
引用
收藏
页码:1 / 11
页数:10
相关论文
共 50 条
  • [41] Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
    Wei, Yongzhuang
    Lu, Jiqiang
    Hu, Yupu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 222 - 232
  • [42] A RELATED-KEY ATTACK ON ITERATED CHAOTIC CIPHERS
    Yang, Yang
    Jin, Chenhui
    KYBERNETIKA, 2008, 44 (04) : 501 - 510
  • [43] Related-key Impossible Differential Attack on Piccolo
    Xu L.-H.
    Guo J.-S.
    Cui J.-Y.
    Li M.-M.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (08): : 2349 - 2361
  • [44] What is the effective key length for a block cipher: an attack on every practical block cipher
    Huang JiaLin
    Lai XueJia
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (07) : 1 - 11
  • [45] What is the effective key length for a block cipher: an attack on every practical block cipher
    HUANG JiaLin
    LAI XueJia
    ScienceChina(InformationSciences), 2014, 57 (07) : 138 - 148
  • [46] Related-key impossible differential cryptanalysis on lightweight cipher TWINE
    Yuechuan Wei
    Peng Xu
    Yisheng Rong
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 509 - 517
  • [47] What is the effective key length for a block cipher: an attack on every practical block cipher
    JiaLin Huang
    XueJia Lai
    Science China Information Sciences, 2014, 57 : 1 - 11
  • [48] Related-key impossible differential cryptanalysis on lightweight cipher TWINE
    Wei, Yuechuan
    Xu, Peng
    Rong, Yisheng
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (02) : 509 - 517
  • [49] Differential Attack on Five Rounds of the SC2000 Block Cipher*
    Lv, Ji-Qiang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 722 - 731
  • [50] Differential Attack on Five Rounds of the SC2000 Block Cipher
    Lu, Jiqiang
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 50 - 59