메뉴 건너뛰기




Volumn 5365 LNCS, Issue , 2008, Pages 294-307

Reflection cryptanalysis of some ciphers

Author keywords

Block cipher; Cryptanalysis; Key schedule; Reflection attack; Related key attack; Round function; Round key; Self similarity; Slide attack

Indexed keywords

ARSENIC; FUNCTIONS; KEYS (FOR LOCKS); PROBABILITY DENSITY FUNCTION; REFLECTION;

EID: 58549088569     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89754-5_23     Document Type: Conference Paper
Times cited : (30)

References (36)
  • 2
    • 33746041431 scopus 로고    scopus 로고
    • The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0028494723 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. J. of Cryptology 7, 229-246 (1994)
    • (1994) J. of Cryptology , vol.7 , pp. 229-246
    • Biham, E.1
  • 4
    • 38149088948 scopus 로고    scopus 로고
    • Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 153-166. Springer, Heidelberg (2007)
    • Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 153-166. Springer, Heidelberg (2007)
  • 5
    • 24944515451 scopus 로고    scopus 로고
    • Related-Key Boomerang and Rectangle Attacks
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Biham, E., Dunkelman, O., Keller, N.: Related-Key Boomerang and Rectangle Attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507-525. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 507-525
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 6
    • 55749108795 scopus 로고    scopus 로고
    • New Cryptanalytic Results on IDEA
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Biham, E., Dunkelman, O., Keller, N.: New Cryptanalytic Results on IDEA. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 412-427. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 412-427
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 7
    • 84897580639 scopus 로고    scopus 로고
    • Biham, E., Dunkelman, O., Keller, N.: A Simple Related-Key Attack on the Full SHACAL-1. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 20-30. Springer, Heidelberg (2006)
    • Biham, E., Dunkelman, O., Keller, N.: A Simple Related-Key Attack on the Full SHACAL-1. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 20-30. Springer, Heidelberg (2006)
  • 8
    • 50249103823 scopus 로고    scopus 로고
    • Biham, E., Dunkelman, O., Keller, N.: A Unified Approach to Related-Key Attacks. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 73-96. Springer, Heidelberg (2008)
    • Biham, E., Dunkelman, O., Keller, N.: A Unified Approach to Related-Key Attacks. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 73-96. Springer, Heidelberg (2008)
  • 10
    • 84957610784 scopus 로고    scopus 로고
    • Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 245-259. Springer, Heidelberg (1999)
    • Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
  • 11
    • 84948988609 scopus 로고    scopus 로고
    • Advanced Slide Attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 589-606
    • Biryukov, A.1    Wagner, D.2
  • 12
    • 84956858200 scopus 로고    scopus 로고
    • Carter, G., Dawson, E., Nielsen, L.: Key Schedules of Iterated Block Ciphers. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, 1438, pp. 80-89. Springer, Heidelberg (1998)
    • Carter, G., Dawson, E., Nielsen, L.: Key Schedules of Iterated Block Ciphers. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 80-89. Springer, Heidelberg (1998)
  • 13
    • 84978995497 scopus 로고
    • The Real Reason for Rivest's Phenomenon
    • Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
    • Coppersmith, D.: The Real Reason for Rivest's Phenomenon. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 535-536. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.218 , pp. 535-536
    • Coppersmith, D.1
  • 14
    • 50249137714 scopus 로고    scopus 로고
    • Courtois, N., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 89-104. Springer, Heidelberg (2008)
    • Courtois, N., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 89-104. Springer, Heidelberg (2008)
  • 15
    • 38149032323 scopus 로고    scopus 로고
    • Dunkelman, O., Keller, N., Kim, J.: Related-Key Rectangle Attack on the Full SHACAL-1. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, 4356, pp. 28-44. Springer, Heidelberg (2007)
    • Dunkelman, O., Keller, N., Kim, J.: Related-Key Rectangle Attack on the Full SHACAL-1. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 28-44. Springer, Heidelberg (2007)
  • 16
    • 0000139052 scopus 로고    scopus 로고
    • Cryptanalysis of Alleged A5 Stream Cipher
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Golić, J.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239-255. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 239-255
    • Golić, J.1
  • 17
    • 84949982494 scopus 로고    scopus 로고
    • Slide Attacks with a Known-Plaintext Cryptanalysis
    • Kim, K.-c, ed, ICISC 2001, Springer, Heidelberg
    • Furuya, S.: Slide Attacks with a Known-Plaintext Cryptanalysis. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 214-225. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2288 , pp. 214-225
    • Furuya, S.1
  • 19
    • 33646763786 scopus 로고    scopus 로고
    • Rediscovery of the Time Memory Tradeoff. In: Cryptology ePrint Archive
    • Report 2005/090
    • Hong, J., Sarkar, P.: Rediscovery of the Time Memory Tradeoff. In: Cryptology ePrint Archive, Report 2005/090 (2005)
    • (2005)
    • Hong, J.1    Sarkar, P.2
  • 20
    • 26444515034 scopus 로고    scopus 로고
    • Hong, S., Kim, J., Kim, G., Lee, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 368-383. Springer, Heidelberg (2005)
    • Hong, S., Kim, J., Kim, G., Lee, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 368-383. Springer, Heidelberg (2005)
  • 21
    • 84962976253 scopus 로고
    • Is DES a Pure Cipher? (Results of More Cycling Experiments on DES)
    • Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
    • Kaliski, B.S., Rivest, R.L., Sherman, T.: Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 212-222. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 212-222
    • Kaliski, B.S.1    Rivest, R.L.2    Sherman, T.3
  • 22
    • 38149004545 scopus 로고    scopus 로고
    • Kara, O., Manap, C.: A new class of Weak Keys for Blowfish. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 167-180. Springer, Heidelberg (2007)
    • Kara, O., Manap, C.: A new class of Weak Keys for Blowfish. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 167-180. Springer, Heidelberg (2007)
  • 23
    • 84944028839 scopus 로고    scopus 로고
    • Kelsey, J., Schneier, B.: Key-Schedule Cryptanalysis of DEAL. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758, pp. 118-134. Springer, Heidelberg (2000)
    • Kelsey, J., Schneier, B.: Key-Schedule Cryptanalysis of DEAL. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 118-134. Springer, Heidelberg (2000)
  • 24
    • 67650338267 scopus 로고    scopus 로고
    • Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Kelsey, J., Schneier, B.,Wagner, D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237-251. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 25
    • 35048899747 scopus 로고    scopus 로고
    • Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.: Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 299-316. Springer, Heidelberg (2004)
    • Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.: Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 299-316. Springer, Heidelberg (2004)
  • 26
    • 38149085478 scopus 로고    scopus 로고
    • Kim, J., Hong, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 225-241. Springer, Heidelberg (2007)
    • Kim, J., Hong, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 225-241. Springer, Heidelberg (2007)
  • 28
    • 35048892576 scopus 로고    scopus 로고
    • Knudsen, L.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, 718, pp. 196-208. Springer, Heidelberg (1993)
    • Knudsen, L.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 196-208. Springer, Heidelberg (1993)
  • 29
    • 84957685431 scopus 로고    scopus 로고
    • Lucks, S.: On the Security of 128-Bit Block Cipher DEAL. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 60-70. Springer, Heidelberg (1999)
    • Lucks, S.: On the Security of 128-Bit Block Cipher DEAL. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 60-70. Springer, Heidelberg (1999)
  • 30
    • 85025704284 scopus 로고
    • Linear Cryptanalysis Method of DES Cipher
    • Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
    • Matsui, M.: Linear Cryptanalysis Method of DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386-397. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 386-397
    • Matsui, M.1
  • 31
    • 85032513290 scopus 로고
    • Cycle Structure of the DES with Weak and Semi-Weak Keys
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Moore, J.H., Simmons, G.J.: Cycle Structure of the DES with Weak and Semi-Weak Keys. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 9-32. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 9-32
    • Moore, J.H.1    Simmons, G.J.2
  • 32
    • 0023294945 scopus 로고
    • Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys
    • Moore, J.H., Simmons, G.J.: Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. IEEE Transactions on Software Engineering 13, 262-273 (1987)
    • (1987) IEEE Transactions on Software Engineering , vol.13 , pp. 262-273
    • Moore, J.H.1    Simmons, G.J.2
  • 33
    • 84953635000 scopus 로고    scopus 로고
    • Schneier, B.: Description of a New Variable - Length Key, 64 Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, 809, pp. 191-204. Springer, Heidelberg (1994)
    • Schneier, B.: Description of a New Variable - Length Key, 64 Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191-204. Springer, Heidelberg (1994)
  • 34
    • 84949198848 scopus 로고    scopus 로고
    • Seki, H., Kaneko, T.: Differential Cryptanalysis of Reduced Rounds of GOST. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, 2012, pp. 315-323. Springer, Heidelberg (2001)
    • Seki, H., Kaneko, T.: Differential Cryptanalysis of Reduced Rounds of GOST. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 315-323. Springer, Heidelberg (2001)
  • 35
    • 21144435120 scopus 로고
    • Decorrelation: A Theory for Block Cipher Security
    • Vaudenay, S.: Decorrelation: A Theory for Block Cipher Security. J. of Cryptology 16(4), 249-286 (1985)
    • (1985) J. of Cryptology , vol.16 , Issue.4 , pp. 249-286
    • Vaudenay, S.1
  • 36
    • 58549088884 scopus 로고    scopus 로고
    • Zabotin, I.A., Glazkov, G.P., Isaeva, V.B.: Cryptographic Protection for Information Processing Systems. Cryptographic Transformation Algorithm. In: Government Standard of the USSR, GOST 28147-89 (1989)
    • Zabotin, I.A., Glazkov, G.P., Isaeva, V.B.: Cryptographic Protection for Information Processing Systems. Cryptographic Transformation Algorithm. In: Government Standard of the USSR, GOST 28147-89 (1989)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.