A new meet-in-the-middle attack on the IDEA block cipher

被引:0
|
作者
Demirci, H [1 ]
Selçuk, AA
Türe, E
机构
[1] Tubitak UEKAE, TR-41470 Gebze, Kocaeli, Turkey
[2] Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
[3] Marmara Univ, Fac Engn, Istanbul 81040, Turkey
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we introduce a novel meet-in-the-middle attack on the IDEA block cipher. The attack consists of a precomputation and an elimination phase. The attack reduces the number of required plaintexts significantly for 4 and 4.5 rounds, and, to the best of our knowledge, it is the first attack on the 5-round IDEA.
引用
收藏
页码:117 / 129
页数:13
相关论文
共 50 条
  • [21] Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher
    Lu, Jiqiang
    Zhou, Wenchang
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 136 - 159
  • [22] The parallel-cut meet-in-the-middle attack
    Ivica Nikolić
    Lei Wang
    Shuang Wu
    Cryptography and Communications, 2015, 7 : 331 - 345
  • [23] Automated Meet-in-the-Middle Attack Goes to Feistel
    Hou, Qingliang
    Dong, Xiaoyang
    Qin, Lingyue
    Zhang, Guoyan
    Wang, Xiaoyun
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT III, 2023, 14440 : 370 - 404
  • [24] MEET-IN-THE-MIDDLE ATTACK ON DIGITAL SIGNATURE SCHEMES
    OHTA, K
    KOYAMA, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 140 - 154
  • [25] Meet-in-the-middle Attack on RAIN-128
    Du X.
    Zheng Y.
    Liang L.
    Li K.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (01): : 327 - 334
  • [26] Quantum meet-in-the-middle attack on Feistel construction
    Yinsong Xu
    Zheng Yuan
    Quantum Information Processing, 22
  • [27] Quantum meet-in-the-middle attack on Feistel construction
    Xu, Yinsong
    Yuan, Zheng
    QUANTUM INFORMATION PROCESSING, 2023, 22 (03)
  • [28] Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC
    Li, Rongjia
    Jin, Chenhui
    IET INFORMATION SECURITY, 2019, 13 (01) : 70 - 75
  • [29] The parallel-cut meet-in-the-middle attack
    Nikolic, Ivica
    Wang, Lei
    Wu, Shuang
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (03): : 331 - 345
  • [30] A meet-in-the-middle collision attack against the new FORK-256
    Saarinen, Markku-Juhani O.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 10 - 17