2012
DOI: 10.1007/978-3-642-34047-5_6
|View full text |Cite
|
Sign up to set email alerts
|

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia

Abstract: International audienceCamellia is one of the widely used block ciphers, which has been selected as an international standard by ISO/IEC. In this paper, by exploiting some interesting properties of the key-dependent layer, we improve previous results on impossible differential cryptanalysis of reduced-round Camellia and gain some new observations. First, we introduce some new 7-round impossible differentials of Camellia for weak keys. These weak keys that work for the impossible differential take 3/4 of the who… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
38
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(38 citation statements)
references
References 19 publications
0
38
0
Order By: Relevance
“…Our results show that as far as Camellia is concerned, the semi-advanced MitM attack technique is more efficient than or at least as efficient as the advanced cryptanalytic techniques studied, except impossible differential cryptanalysis; in this latter case the MitM attacks are now one or two rounds inferior to the best newly emerging impossible differential cryptanalysis results in [2,22].…”
Section: Discussionmentioning
confidence: 75%
See 2 more Smart Citations
“…Our results show that as far as Camellia is concerned, the semi-advanced MitM attack technique is more efficient than or at least as efficient as the advanced cryptanalytic techniques studied, except impossible differential cryptanalysis; in this latter case the MitM attacks are now one or two rounds inferior to the best newly emerging impossible differential cryptanalysis results in [2,22].…”
Section: Discussionmentioning
confidence: 75%
“…If the FL −1 function were modified to have a good avalanche effect, then those MitM properties would involve a large number of unknown 1-bit constant parameters, and the resulting MitM attacks would be ineffective for the resulting cipher, but nevertheless it does not necessarily resist the HO-MitM attack technique, for those HO-MitM attacks described in [24] work as long as that integral property of Camellia holds (canceling the FL −1 function). Actually, if the FL/FL −1 functions had had a good avalanche effect, the Camellia cipher could have withstood the best currently known cryptanalytic results that are the newly emerging impossible differential cryptanalysis results [2,22]. In this sense, the FL/FL −1 functions do play an important role in the security of Camellia.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As opposed to that, in this paper, we only discuss attacks on Camellia with F L/F L −1 and whitening key starting from the first round. Rather recently, some attacks on reduced-round Camellia with F L/F L −1 and whitening key have been introduced [6,11,12]. In this setting, the best attack on Camellia-128 is the impossible differential attack on 10 rounds [11].…”
Section: Introductionmentioning
confidence: 99%
“…Rather recently, some attacks on reduced-round Camellia with F L/F L −1 and whitening key have been introduced [6,11,12]. In this setting, the best attack on Camellia-128 is the impossible differential attack on 10 rounds [11]. A similar attack can break 11 rounds of Camellia-192 [11].…”
Section: Introductionmentioning
confidence: 99%