1998
DOI: 10.1007/3-540-69710-1_18
|View full text |Cite
|
Sign up to set email alerts
|

Differential Cryptanalysis of the ICE Encryption Algorithm

Abstract: ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against differential and linear cryptanalysis. In this paper we will show however that we can use low Hamming weighted differences to perform a practical, key dependent, differential attack on ICE. The main conclusion is that the keyed permutation is not as effective as it was conjectured to be.1 The ICE Algorithm ICE [7], which stands for I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2001
2001
2014
2014

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…In such applications of PNs the permutation on data bit strings is a linear operation. Such use of PNs has been shown [5] to be not very effective against differential cryptanalysis. It seems [10] that cryptology can significantly benefit from the use of PNs to perform DataDependent (DD) Permutations (DDPs), since such permutations are variable.…”
Section: Introductionmentioning
confidence: 98%
“…In such applications of PNs the permutation on data bit strings is a linear operation. Such use of PNs has been shown [5] to be not very effective against differential cryptanalysis. It seems [10] that cryptology can significantly benefit from the use of PNs to perform DataDependent (DD) Permutations (DDPs), since such permutations are variable.…”
Section: Introductionmentioning
confidence: 98%
“…For these reasons, block ciphers have been designed to consider the differential cryptanalysis since the middle of 1990's. Differential cryptanalysis has also been advanced variously -Conditional Differential Cryptanalysis [1,9], Truncated Differential Cryptanalysis [5], Impossible Differential Cryptanalysis [2], Higher Order Differential Cryptanalysis [5,6,8], Boomerang attack [11], and so on.…”
Section: Introductionmentioning
confidence: 99%