메뉴 건너뛰기




Volumn 22, Issue 3, 2007, Pages 449-456

Impossible differential cryptanalysis of reduced-round ARIA and Camellia

Author keywords

ARIA; Block cipher; Camellia; Data complexity; Impossible differential cryptanalysis; Time complexity

Indexed keywords

BLOCK CIPHERS; CAMELLIA; DATA COMPLEXITY; TIME COMPLEXITY;

EID: 34249846502     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-007-9056-0     Document Type: Article
Times cited : (96)

References (28)
  • 1
    • 35048829391 scopus 로고    scopus 로고
    • New block cipher: ARIA
    • Pros. Information Security and Cryptology ICISC'03, Seoul, Korea, Springer-Verlag, November 27-28
    • Daesimg Kwon, Jaesung Kim, Sangwoo Park et al. New block cipher: ARIA. In Pros. Information Security and Cryptology (ICISC'03), Seoul, Korea, LNCS 2971, Springer-Verlag, November 27-28, 2003, pp.432-445.
    • (2003) LNCS , vol.2971 , pp. 432-445
    • Kwon, D.1    Kim, J.2    Park, S.3
  • 2
    • 0012022902 scopus 로고    scopus 로고
    • Specification of Camellia -A 128-bit block cipher
    • Proc. Selected Areas in Cryptography SAC'2000, Waterloo, Canada, Springer-Verlag, August 14-15
    • Aoki K, Ichikawa T, Kanda M et al. Specification of Camellia -A 128-bit block cipher. In Proc. Selected Areas in Cryptography (SAC'2000), Waterloo, Canada, LNCS 2012, Springer-Verlag, August 14-15, 2000, pp.183-191.
    • (2000) LNCS , pp. 183-191
    • Aoki, K.1    Ichikawa, T.2    Kanda, M.3
  • 3
    • 84949951043 scopus 로고    scopus 로고
    • Truncated differential cryptanalysis of Camellia
    • Proc. Information Security and Oryptology ICISC'01, Seoul, Korea, Springer-Verlag, December 6-7
    • Lee S, Hong S, Lee S et al. Truncated differential cryptanalysis of Camellia. In Proc. Information Security and Oryptology (ICISC'01), Seoul, Korea, LNCS 2288, Springer-Verlag, December 6-7, 2001, pp.32-38.
    • (2001) LNCS , vol.2288 , pp. 32-38
    • Lee, S.1    Hong, S.2    Lee, S.3
  • 4
    • 84946831143 scopus 로고    scopus 로고
    • Sugita M, Kobara K, Imai H. Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. In Proc. Advances in Cryptology (Asiacrypt'01), Queensland, Australia, LNCS 224B, Springer-Verlag, December 9-13, 2001, pp193-207.
    • Sugita M, Kobara K, Imai H. Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. In Proc. Advances in Cryptology (Asiacrypt'01), Queensland, Australia, LNCS 224B, Springer-Verlag, December 9-13, 2001, pp193-207.
  • 5
    • 33645589195 scopus 로고    scopus 로고
    • Higher order differential attack of Camellia (II)
    • Newfoundland, Canada, LAICS'2595, Springer-Verlag, August 15-16
    • Hatano Y, Sekine H, Kaneko T. Higher order differential attack of Camellia (II). In Proc. Selected Areas in Cryptography (SAC'02), Newfoundland, Canada, LAICS'2595, Springer-Verlag, August 15-16, 2002, pp.39-56.
    • (2002) Proc. Selected Areas in Cryptography (SAC'02) , pp. 39-56
    • Hatano, Y.1    Sekine, H.2    Kaneko, T.3
  • 6
    • 84949446672 scopus 로고    scopus 로고
    • On the security of Camellia against the square attack
    • Proc. Fast Software Encryption FSE'08, Springer-Verlag, Leuven, Belgium, February 4-6
    • Yeom Y, Park S, Kim I. On the security of Camellia against the square attack. In Proc. Fast Software Encryption (FSE'08), Springer-Verlag, Leuven, Belgium, LNCS 2356, February 4-6, 2002, pp.89-99.
    • (2002) LNCS , vol.2356 , pp. 89-99
    • Yeom, Y.1    Park, S.2    Kim, I.3
  • 7
    • 34249847723 scopus 로고    scopus 로고
    • Differential, linear, boomerang and rectangle cryptanalysis of reduced-round Camellia
    • Munich, Germany, November 6-7, Available at
    • Shirai T. Differential, linear, boomerang and rectangle cryptanalysis of reduced-round Camellia. In Proc. the Third NESSIE Workshop, Munich, Germany, November 6-7, 2002. Available at: https://www.cosic.esat.kuleuven.be/ nessie/.
    • (2002) Proc. the Third NESSIE Workshop
    • Shirai, T.1
  • 9
    • 33750038591 scopus 로고    scopus 로고
    • Collision attack and pseudorandomness of reduced-round Camellia
    • Proc. Selected Areas in Cryptography SAC 2004, Waterloo, Canada, Springer-Verlag, August 9-10
    • Wenling Wu, Dengguo Feng, Hua Chen. Collision attack and pseudorandomness of reduced-round Camellia. In Proc. Selected Areas in Cryptography (SAC 2004), Waterloo, Canada, LNCS 3357, Springer-Verlag, August 9-10, 2004, pp.256-270.
    • (2004) LNCS , vol.3357 , pp. 256-270
    • Wu, W.1    Feng, D.2    Chen, H.3
  • 10
    • 33745633334 scopus 로고    scopus 로고
    • New observation on Camellia
    • Proc. Selected Areas in Cryptography SAC 2005, Springer-Verlag, Kingston, Canada, August 11-12
    • Duo Lei, Li Chao, Keqin Feng. New observation on Camellia. In Proc. Selected Areas in Cryptography (SAC 2005), Springer-Verlag, Kingston, Canada, LNCS 3897, August 11-12, 2005, pp.51-64.
    • (2005) LNCS , vol.3897 , pp. 51-64
    • Lei, D.1    Chao, L.2    Feng, K.3
  • 11
    • 32144451896 scopus 로고    scopus 로고
    • Pseudorandomness of Camellia-like scheme
    • Wenling Wu. Pseudorandomness of Camellia-like scheme. Journal of Computer Science and Technology, 2006, 21(1): 82-88.
    • (2006) Journal of Computer Science and Technology , vol.21 , Issue.1 , pp. 82-88
    • Wu, W.1
  • 14
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • Proc. Advances in Cryptology-EUROCRYPT'93, Lofthus, Norway, Springer-Verlag, May 23-27
    • Matsui M. Linear cryptanalysis method for DES cipher. In Proc. Advances in Cryptology-EUROCRYPT'93, Lofthus, Norway, LNCS 765, Springer-Verlag, May 23-27, 1993, pp.386-397.
    • (1993) LNCS , vol.765 , pp. 386-397
    • Matsui, M.1
  • 15
    • 84948949623 scopus 로고
    • Truncated and higher order differentials
    • Proc. Fast Software Encryption FSE'95, Leuven, Belgium, Springer-Verlag, December
    • Knudsen L. Truncated and higher order differentials. In Proc. Fast Software Encryption (FSE'95), Leuven, Belgium, LNCS 2595, Springer-Verlag, December 1994, pp.196-211.
    • (1994) LNCS , vol.2595 , pp. 196-211
    • Knudsen, L.1
  • 16
    • 84957634424 scopus 로고    scopus 로고
    • Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
    • Proc. Advances in Cryptology-EUROCRYPT'99, Rague, Czech Republic, Springer-Verlag, May 2-6
    • Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In Proc. Advances in Cryptology-EUROCRYPT'99, Rague, Czech Republic, LNCS 2595, Springer-Verlag, May 2-6, 1999, pp.12-23.
    • (1999) LNCS , vol.2595 , pp. 12-23
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 17
    • 84957610784 scopus 로고
    • Slide attacks
    • Proc. Fast Software Encryption FSE'99, Rome, Italy, Springer-Verlag, March 24-26
    • Biryukov A, Wagner D. Slide attacks. In Proc. Fast Software Encryption (FSE'99), Rome, Italy, LNCS 1636, Springer-Verlag, March 24-26, 1999, pp.245-259.
    • (1636) LNCS , pp. 245-259
    • Biryukov, A.1    Wagner, D.2
  • 18
    • 84948988609 scopus 로고
    • Advanced slide attacks
    • Proc. Advances in Cryptology-EUROCRYPT'00, Bruges, Belgium, Springer-Verlag, May 14-18
    • Biryukov A, Wagner D. Advanced slide attacks. In Proc. Advances in Cryptology-EUROCRYPT'00, Bruges, Belgium, LNCS 1807, Springer-Verlag, May 14-18, 2000, pp.589-606.
    • (1807) LNCS , pp. 589-606
    • Biryukov, A.1    Wagner, D.2
  • 19
    • 77949459994 scopus 로고    scopus 로고
    • Integral cryptanalysis (extended abstract)
    • Proc. Fast Software Encryption FSE 2002, Leuven, Belgium, Springer-Verlag, February 4-6
    • Knudsen L, Wagner D. Integral cryptanalysis (extended abstract). In Proc. Fast Software Encryption (FSE 2002), Leuven, Belgium, LNCS 2595, Springer-Verlag, February 4-6, 2002, pp.112-127.
    • (2002) LNCS , vol.2595 , pp. 112-127
    • Knudsen, L.1    Wagner, D.2
  • 20
    • 0001130184 scopus 로고
    • The boomerang attack
    • Proc. Fast Software Encryption FSE'99, Rome, Italy, Springer-Verlag, March 24-26
    • Wagner D. The boomerang attack. In Proc. Fast Software Encryption (FSE'99), Rome, Italy, LNCS 1636, Springer-Verlag, March 24-26, 1999, pp.157-170.
    • (1636) LNCS , pp. 157-170
    • Wagner, D.1
  • 21
    • 84947929289 scopus 로고    scopus 로고
    • The interpolation attack against block ciphers
    • Proc. Fast Software Encryption FSE'99, Rome, Italy, Springer-Verlag, pp
    • Jakobsen T, Knudsen L. The interpolation attack against block ciphers. In Proc. Fast Software Encryption (FSE'99), Rome, Italy, LNCS 1267, Springer-Verlag, pp.28-40.
    • LNCS , vol.1267 , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.2
  • 22
    • 84958765510 scopus 로고    scopus 로고
    • Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations. In Proc. Advances in Cryptology-ASIACRYPT'02, Queenstown, New Zealand, LNCS 2595, Springer-Verlag, December 1-5, 2002, pp.267-287.
    • Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations. In Proc. Advances in Cryptology-ASIACRYPT'02, Queenstown, New Zealand, LNCS 2595, Springer-Verlag, December 1-5, 2002, pp.267-287.
  • 23
    • 84949991813 scopus 로고    scopus 로고
    • Improved impossible differential cryptanalysis of Rijndael and Crypton
    • Proc. International Conference on Information Security and Cryptology ICISC'01, Seoul, South Korea, Springer-Verlag, December 6-7
    • Jung Hee Cheon, Munju Kim, Kwangjo Kim et al. Improved impossible differential cryptanalysis of Rijndael and Crypton. In Proc. International Conference on Information Security and Cryptology (ICISC'01), Seoul, South Korea, LNCS 2288, Springer-Verlag, December 6-7, 2001, pp.39-49.
    • (2001) LNCS , vol.2288 , pp. 39-49
    • Hee Cheon, J.1    Kim, M.2    Kim, K.3
  • 24
    • 2642584905 scopus 로고    scopus 로고
    • Impossible differential cryptanalysis of 7-round AES
    • Raphael Chung-Wei Phan. Impossible differential cryptanalysis of 7-round AES. Information Processing Letters, 2004, 91(1): 33-38.
    • (2004) Information Processing Letters , vol.91 , Issue.1 , pp. 33-38
    • Chung-Wei Phan, R.1
  • 25
    • 24944480579 scopus 로고    scopus 로고
    • Related-key differential cryptanalysis of 192-bit key AES variants
    • Proc. Selected Areas in Cryptography SAC'2003, Ottawa, Canada, Springer-Verlag, August 14-15
    • Goce Jakimoski, Yvo Desmedt. Related-key differential cryptanalysis of 192-bit key AES variants. In Proc. Selected Areas in Cryptography (SAC'2003), Ottawa, Canada, LNCS 3006, Springer-Verlag, August 14-15, 2003, pp.208-221.
    • (2003) LNCS , vol.3006 , pp. 208-221
    • Jakimoski, G.1    Desmedt, Y.2
  • 26
    • 33745642130 scopus 로고    scopus 로고
    • Related-key impossible differential attacks on 8-round AES-192
    • Proc. The Cryptographer's Track CT-RSA, San Jose, CA, USA, Springer-Verlag, February 13-17
    • Biham E, Orr Dunkelman, Nathan Keller. Related-key impossible differential attacks on 8-round AES-192. In Proc. The Cryptographer's Track (CT-RSA), San Jose, CA, USA, LNCS 3860, Springer-Verlag, February 13-17, 2006, pp.21-33.
    • (2006) LNCS , vol.3860 , pp. 21-33
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 27
    • 38149050765 scopus 로고    scopus 로고
    • Improved related-key impossible differential attacks on reduced-round AES-192
    • Montreal, Canada, Springer-Verlag, August 17-18
    • Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng. Improved related-key impossible differential attacks on reduced-round AES-192. In Proc. Selected Areas in Cryptography (SAC'3006), Montreal, Canada, Springer-Verlag, August 17-18, 2006, pp.168-181.
    • (2006) Proc. Selected Areas in Cryptography (SAC'3006) , pp. 168-181
    • Zhang, W.1    Wu, W.2    Zhang, L.3    Feng, D.4
  • 28
    • 35048822981 scopus 로고    scopus 로고
    • Bon Wook Koo, Hwan Seok Jang, Jung Hwan Song. Constructing and cryptanalysis of a 16 × 16 binary matrix as a diffusion layer. In Proc. Int. Workshop on Information Security Applications, Jeju Island, Korea, LNCS 2908, Springer-Verlag, August 25-27, 2003, pp.489-503.
    • Bon Wook Koo, Hwan Seok Jang, Jung Hwan Song. Constructing and cryptanalysis of a 16 × 16 binary matrix as a diffusion layer. In Proc. Int. Workshop on Information Security Applications, Jeju Island, Korea, LNCS 2908, Springer-Verlag, August 25-27, 2003, pp.489-503.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.