New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia

Abstract : Camellia is one of the widely used block ciphers, which has been selected as an international standard by ISO/IEC. In this paper, by exploiting some interesting properties of the key-dependent layer, we improve previous results on impossible differential cryptanalysis of reduced-round Camellia and gain some new observations. First, we introduce some new 7-round impossible differentials of Camellia for weak keys. These weak keys that work for the impossible differential take 3/4 of the whole key space, therefore, we further get rid of the weak-key assumption and leverage the attacks on reduced-round Camellia to all keys by utilizing the multiplied method. Second, we build a set of differentials which contains at least one 8-round impossible differential of Camellia with two FL/FL − 1 layers. Following this new result, we show that the key-dependent transformations inserted in Camellia cannot resist impossible differential cryptanalysis effectively. Based on this set of differentials, we present a new cryptanalytic strategy to mount impossible differential attacks on reduced-round Camellia.
Type de document :
Communication dans un congrès
Anne Canteaut. FSE 2012 - 19th International Workshop Fast Software Encryption, Mar 2012, Washington, United States. Springer, Lecture Notes in Computer Science, 7549, pp.90-109, 2012, Fast Software Encryption. 〈10.1007/978-3-642-34047-5_6〉
Liste complète des métadonnées

https://hal.inria.fr/hal-00922229
Contributeur : Phong Q. Nguyen <>
Soumis le : mercredi 25 décembre 2013 - 10:22:25
Dernière modification le : vendredi 25 mai 2018 - 12:02:06

Lien texte intégral

Identifiants

Collections

Citation

Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, et al.. New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. Anne Canteaut. FSE 2012 - 19th International Workshop Fast Software Encryption, Mar 2012, Washington, United States. Springer, Lecture Notes in Computer Science, 7549, pp.90-109, 2012, Fast Software Encryption. 〈10.1007/978-3-642-34047-5_6〉. 〈hal-00922229〉

Partager

Métriques

Consultations de la notice

288