2001
DOI: 10.1007/3-540-45682-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis

Abstract: This paper describes truncated and impossible differential cryptanalysis of the 128-bit block cipher Camellia, which was proposed by NTT and Mitsubishi Electric Corporation. Our work improves on the best known truncated and impossible differential cryptanalysis. As a result, we show a nontrivial 9-round byte characteristic, which may lead to a possible attack of reduced-round version of Camellia without input/output whitening, F L or F L −1 in a chosen plain text scenario. Previously, only 6-round differential… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
37
0

Year Published

2002
2002
2011
2011

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(37 citation statements)
references
References 6 publications
0
37
0
Order By: Relevance
“…A similar method can be seen in [20]. However, since we could not find a general rule of proof, we just do conjecture it in the case that m is large.…”
Section: Conjecture 2 If R ≥ M 2 There Does Not Exist An Impossiblmentioning
confidence: 78%
“…A similar method can be seen in [20]. However, since we could not find a general rule of proof, we just do conjecture it in the case that m is large.…”
Section: Conjecture 2 If R ≥ M 2 There Does Not Exist An Impossiblmentioning
confidence: 78%
“…There are a number of results on simple versions of Camellia which exclude the F L/F L −1 layers and whitening being given in recent years [6,10,13,14,16,17,18,19]. Among them, the impossible differential attacks [3] are most efficient [13,14,17,18].…”
Section: Introductionmentioning
confidence: 99%
“…Among them, the impossible differential attacks [3] are most efficient [13,14,17,18]. Since the existence of F L/F L −1 layers will probably destroy the impossibility, non of the impossible differential paths in these attacks includes the F L/F L −1 layers.…”
Section: Introductionmentioning
confidence: 99%
“…Nov. 2001) selected as the AES (Advanced Encryption Standard) algorithm [11]. This cipher has been reputed to be secure against conventional cryptanalytic methods [4,8], such as DC (Differential Cryptanalysis) [1] and LC (Linear Cryptanalysis) [7], and throughout the AES process the security of the AES algorithm was examined with considerable cryptanalytic methods [2-4, 13, 14]. But despite the novelty of the AES algorithm [5], the fact that the AES algorithm uses mathematically simple functions [6,12,15,16] has led to some commentators' concern about the security of this cipher.…”
Section: Introductionmentioning
confidence: 99%