A Study on Higher Order Differential Attack of Camellia

  • KAWABATA Takeshi
    the Department of Electrical Engineering, Faculty of Science and Technology, Tokyo University of Science
  • TAKEDA Masaki
    the Department of Electrical Engineering, Faculty of Science and Technology, Tokyo University of Science
  • KANEKO Toshinobu
    the Department of Electrical Engineering, Faculty of Science and Technology, Tokyo University of Science

この論文をさがす

抄録

The encryption algorithm Camellia is a 128 bit block cipher proposed by NTT and Mitsubishi, Japan. Since the algebraic degree of the outputs after 3 rounds is greater than 128, designers estimate that it is impossible to attack Camellia by higher order differential. In this paper, we show a new higher order differential attack which controls the value of differential using proper fixed value of plaintext. As the result, we found that 6-round F-function can be attacked using 8th order differentials. The attack requires 2^17 chosen plaintexts and 2^22 F-function operations. Our computer simulation took about 2 seconds for the attack. If we take 2-R elimination algorithm, 7-round F-function will be attacked using 8th order differentials. This attack requires 2^19 chosen plaintexts and 2^64 F-function operations, which is less than exhaustive search for 128 bit key.

収録刊行物

参考文献 (8)*注記

もっと見る

詳細情報 詳細情報について

  • CRID
    1571698602418367104
  • NII論文ID
    110003212477
  • NII書誌ID
    AA10826239
  • ISSN
    09168508
  • 本文言語コード
    en
  • データソース種別
    • CiNii Articles

問題の指摘

ページトップへ