A Study on Higher Order Differential Attack of Camellia
-
- KAWABATA Takeshi
- the Department of Electrical Engineering, Faculty of Science and Technology, Tokyo University of Science
-
- TAKEDA Masaki
- the Department of Electrical Engineering, Faculty of Science and Technology, Tokyo University of Science
-
- KANEKO Toshinobu
- the Department of Electrical Engineering, Faculty of Science and Technology, Tokyo University of Science
この論文をさがす
抄録
The encryption algorithm Camellia is a 128 bit block cipher proposed by NTT and Mitsubishi, Japan. Since the algebraic degree of the outputs after 3 rounds is greater than 128, designers estimate that it is impossible to attack Camellia by higher order differential. In this paper, we show a new higher order differential attack which controls the value of differential using proper fixed value of plaintext. As the result, we found that 6-round F-function can be attacked using 8th order differentials. The attack requires 2^17 chosen plaintexts and 2^22 F-function operations. Our computer simulation took about 2 seconds for the attack. If we take 2-R elimination algorithm, 7-round F-function will be attacked using 8th order differentials. This attack requires 2^19 chosen plaintexts and 2^64 F-function operations, which is less than exhaustive search for 128 bit key.
収録刊行物
-
- IEICE transactions on fundamentals of electronics, communications and computer sciences
-
IEICE transactions on fundamentals of electronics, communications and computer sciences 86 (1), 31-36, 2003-01-01
一般社団法人電子情報通信学会
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1571698602418367104
-
- NII論文ID
- 110003212477
-
- NII書誌ID
- AA10826239
-
- ISSN
- 09168508
-
- 本文言語コード
- en
-
- データソース種別
-
- CiNii Articles