메뉴 건너뛰기




Volumn 6558 LNCS, Issue , 2011, Pages 250-267

Meet-in-the-middle attacks on reduced-round XTEA

Author keywords

block cipher; Cryptanalysis; Feistel network; meet in the middle attack; XETA; XTEA

Indexed keywords

BLOCK CIPHERS; CRYPTANALYSIS; FEISTEL NETWORK; MEET-IN-THE-MIDDLE ATTACK; XETA; XTEA;

EID: 79951806216     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19074-2_17     Document Type: Conference Paper
Times cited : (23)

References (24)
  • 1
    • 72449208565 scopus 로고    scopus 로고
    • Preimages for step-reduced SHA-2
    • Matsui, M. (ed.) ASIACRYPT 2009 Springer, Heidelberg
    • Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., Wang, L.: Preimages for Step-Reduced SHA-2. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 578-597. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 578-597
    • Aoki, K.1    Guo, J.2    Matusiewicz, K.3    Sasaki, Y.4    Wang, L.5
  • 2
    • 70350630742 scopus 로고    scopus 로고
    • Preimage attacks on one-block MD4, 63-Step MD5 and more
    • Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008 Springer, Heidelberg
    • Aoki, K., Sasaki, Y.: Preimage Attacks on One-Block MD4, 63-Step MD5 and More. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5381 , pp. 103-119
    • Aoki, K.1    Sasaki, Y.2
  • 3
    • 77954706665 scopus 로고    scopus 로고
    • Another look at complementation properties
    • Hong, S., Iwata, T. (eds.) FSE 2010 Springer, Heidelberg
    • Bouillaguet, C., Dunkelman, O., Leurent, G., Fouque, P.-A.: Another Look at Complementation Properties. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 347-364. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6147 , pp. 347-364
    • Bouillaguet, C.1    Dunkelman, O.2    Leurent, G.3    Fouque, P.-A.4
  • 4
    • 85034623360 scopus 로고
    • Cryptanalysis of des with a reduced number of rounds: Sequences of linear factors in block ciphers
    • Williams, H.C. (ed.) CRYPTO 1985 Springer, Heidelberg
    • Chaum, D., Evertse, J.-H.: Cryptanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 192-211. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 192-211
    • Chaum, D.1    Evertse, J.-H.2
  • 5
    • 0017501281 scopus 로고
    • Exhaustive cryptanalysis of the nbs data encryption standard
    • Diffie, W., Hellman, M.E.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer 10(6), 74-84 (1977) (Pubitemid 8574342)
    • (1977) Computer , vol.10 , Issue.6 , pp. 74-84
    • Diffie Whitfield1    Hellman Martin, E.2
  • 6
    • 38349081452 scopus 로고    scopus 로고
    • Improved meet-in-the-middle attacks on reduced-round des
    • Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) INDOCRYPT 2007 Springer, Heidelberg
    • Dunkelman, O., Sekar, G., Preneel, B.: Improved Meet-in-the-Middle Attacks on Reduced-Round DES. In: Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 86-100. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4859 , pp. 86-100
    • Dunkelman, O.1    Sekar, G.2    Preneel, B.3
  • 7
    • 79951804179 scopus 로고    scopus 로고
    • Kernel v2.6.14 tea.c
    • Grothe, A.: Kernel v2.6.14 tea.c. Linux Headquarters (2004), http://www.linuxhq.com/kernel/v2.6/14/crypto/tea.c
    • (2004) Linux Headquarters
    • Grothe, A.1
  • 8
    • 35048813090 scopus 로고    scopus 로고
    • Differential cryptanalysis of TEA and XTEA
    • Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003 Springer, Heidelberg
    • Hong, S., Hong, D., Ko, Y., Chang, D., Lee, W., Lee, S.: Differential Cryptanalysis of TEA and XTEA. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 402-417. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2971 , pp. 402-417
    • Hong, S.1    Hong, D.2    Ko, Y.3    Chang, D.4    Lee, W.5    Lee, S.6
  • 9
    • 77954613537 scopus 로고    scopus 로고
    • Improved preimage attack for 67-Step HAS-160
    • Lee, D., Hong, S. (eds.) ICISC 2009 Springer, Heidelberg
    • Hong, D., Koo, B., Sasaki, Y.: Improved Preimage Attack for 67-Step HAS-160. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 332-348. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5984 , pp. 332-348
    • Hong, D.1    Koo, B.2    Sasaki, Y.3
  • 10
    • 44449126213 scopus 로고    scopus 로고
    • A practical attack on kee loq
    • Smart, N.P. (ed.) EUROCRYPT 2008 Springer, Heidelberg
    • Indesteege, S., Keller, N., Dunkelman, O., Biham, E., Preneel, B.: A Practical Attack on KeeLoq. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 1-18. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 1-18
    • Indesteege, S.1    Keller, N.2    Dunkelman, O.3    Biham, E.4    Preneel, B.5
  • 11
    • 58549102773 scopus 로고    scopus 로고
    • Chai-tea, cryptographic hardware implementations of xTEA
    • Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008 Springer, Heidelberg
    • Kaps, J.-P.: Chai-Tea, Cryptographic Hardware Implementations of xTEA. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 363-375. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5365 , pp. 363-375
    • Kaps, J.-P.1
  • 12
    • 67650338267 scopus 로고    scopus 로고
    • Key-schedule cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
    • Koblitz, N. (ed.) CRYPTO 1996 Springer, Heidelberg
    • Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237-251. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 13
    • 0006540774 scopus 로고    scopus 로고
    • Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA
    • Kelsey, J., Schneier, B., Wagner, D.: Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 233-246. Springer, Heidelberg (1997) (Pubitemid 127148051)
    • (1997) Lecture Notes in Computer Science , Issue.1334 , pp. 233-246
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 14
    • 35048899747 scopus 로고    scopus 로고
    • Related-key differential attacks on 27 Rounds of XTEA and Full-Round GOST
    • Roy, B.K., Meier, W. (eds.) FSE 2004 Springer, Heidelberg
    • Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.-S.: Related-Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 299-316. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3017 , pp. 299-316
    • Ko, Y.1    Hong, S.2    Lee, W.3    Lee, S.4    Kang, J.-S.5
  • 15
    • 84887264477 scopus 로고    scopus 로고
    • A weak key class of XTEA for a related-key rectangle attack
    • Nguyen, P.Q. (ed.) VIETCRYPT 2006 Springer, Heidelberg
    • Lee, E., Hong, D., Chang, D., Hong, S., Lim, J.: A Weak Key Class of XTEA for a Related-Key Rectangle Attack. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 286-297. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4341 , pp. 286-297
    • Lee, E.1    Hong, D.2    Chang, D.3    Hong, S.4    Lim, J.5
  • 16
    • 58949086800 scopus 로고    scopus 로고
    • Related-key rectangle attack on 36 rounds of the XTEA block cipher
    • Lu, J.: Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security 8(1), 1-11 (2009), http://jiqiang.googlepages.com/IJIS8.pdf
    • (2009) International Journal of Information Security , vol.8 , Issue.1 , pp. 1-11
    • Lu, J.1
  • 17
    • 84949443075 scopus 로고    scopus 로고
    • Impossible differential cryptanal-ysis of reduced round XTEA and TEA
    • Daemen, J., Rijmen, V. (eds.) FSE 2002 Springer, Heidelberg
    • Moon, D., Hwang, K., Lee, W., Lee, S., Lim, J.: Impossible Differential Cryptanal-ysis of Reduced Round XTEA and TEA. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 49-60. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2365 , pp. 49-60
    • Moon, D.1    Hwang, K.2    Lee, W.3    Lee, S.4    Lim, J.5
  • 18
    • 15744395962 scopus 로고    scopus 로고
    • Computer Laboratory, University of Cambridge October
    • Needham, R.M., Wheeler, D.J.: Tea extensions, technical report, Computer Laboratory, University of Cambridge (October 1997), http://www.cix.co.uk/ ∼klockstone/xtea.pdf
    • (1997) Tea Extensions, Technical Report
    • Needham, R.M.1    Wheeler, D.J.2
  • 19
    • 34247179823 scopus 로고    scopus 로고
    • Technical report Computer Laboratory University of Cambridge October
    • Needham, R.M., Wheeler, D.J.: Correction to xtea. Technical report, Computer Laboratory, University of Cambridge (October 1998), http://www.movable-type.co.uk/scripts/xxtea.pdf
    • (1998) Correction to Xtea
    • Needham, R.M.1    Wheeler, D.J.2
  • 20
    • 79951796088 scopus 로고    scopus 로고
    • unpublished manuscript October
    • Saarinen, M.-J.: Cryptanalysis of Block TEA, unpublished manuscript (October 1998), http://groups.google.com/group/sci.crypt.research/msg/ f52a533d1e2fa15e
    • (1998) Cryptanalysis of Block TEA
    • Saarinen, M.-J.1
  • 21
    • 67650679771 scopus 로고    scopus 로고
    • Finding preimages in Full MD5 faster than exhaustive search
    • Joux, A. (ed.) EUROCRYPT 2009 Springer, Heidelberg
    • Sasaki, Y., Aoki, K.: Finding Preimages in Full MD5 Faster Than Exhaustive Search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 134-152. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 134-152
    • Sasaki, Y.1    Aoki, K.2
  • 22
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4), 656-715 (1949)
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 23
    • 36448992835 scopus 로고    scopus 로고
    • 17 mistakes microsoft made in the xbox security system
    • Steil, M.: 17 Mistakes Microsoft Made in the Xbox Security System. In: Chaos Communication Congress 2005 (2005), http://events.ccc.de/congress/2005/ fahrplan/events/559.en.html
    • (2005) Chaos Communication Congress 2005
    • Steil, M.1
  • 24
    • 84869815133 scopus 로고
    • TEA, a tiny encryption algorithm
    • Preneel, B. (ed.) FSE 1994 Springer, Heidelberg
    • Wheeler, D.J., Needham, R.M.: TEA, a Tiny Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363-366. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.1008 , pp. 363-366
    • Wheeler, D.J.1    Needham, R.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.