Collision attack on reduced-round Camellia

被引:3
|
作者
Wu, WL [1 ]
Feng, DG [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
block cipher; collision attack; key; data complexity; time complexity;
D O I
10.1360/03yf0293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers; are used to attack on 6, 7, 8 and 9 rounds of Camellia with 128-bit key and 8, 9 and 10 rounds of Camellia with 192/256-bit key. The 128-bit key of 6 rounds Camellia can be recovered with 2(10) chosen plaintexts and 2(15) encryptions. The 128-bit key of 7 rounds Camellia can be recovered with 2(12) chosen plaintexts and 2(54.5) encryptions. The 128-bit key of 8 rounds Camellia can be recovered with 2(13) chosen plaintexts and 2(112.1) encryptions. The 128-bit key of 9 rounds Camellia can be recovered with 2(113.6) chosen plaintexts and 2(121) encryptions. The 192/256-bit key of 8 rounds Camellia can be recovered with 2(13) chosen plaintexts and 2(111.1) encryptions. The 192/256-bit key of 9 rounds Camellia can be recovered with 2 13 chosen plaintexts and 2 175,6 encryptions. The 256-bit key of 10 rounds Camellia can be recovered with 2(14) chosen plaintexts and 2(239.9) encryptions.
引用
收藏
页码:78 / 90
页数:13
相关论文
共 50 条
  • [31] Zero-correlation linear attack on reduced-round SKINNY
    Yi ZHANG
    Ting CUI
    Congjun WANG
    Frontiers of Computer Science, 2023, 17 (04) : 189 - 201
  • [32] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Wen, Long
    Wang, Mei-Qin
    Zhao, Jing-Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) : 165 - 176
  • [33] Related-Key Impossible Diferential Attack on Reduced-Round LBlock
    温隆
    王美琴
    赵静远
    Journal of Computer Science & Technology, 2014, 29 (01) : 165 - 176
  • [34] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Long Wen
    Mei-Qin Wang
    Jing-Yuan Zhao
    Journal of Computer Science and Technology, 2014, 29 : 165 - 176
  • [35] Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256
    Liu, Ya
    Gu, Dawu
    Liu, Zhiqiang
    Li, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (11) : 2451 - 2458
  • [36] Cryptanalysis of Reduced-Round DASH
    刘树生
    龚征
    王立斌
    Journal of Computer Science & Technology, 2013, 28 (01) : 159 - 164
  • [37] Cryptanalysis of Reduced-Round Whirlwind
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 20 - 38
  • [38] Cryptanalysis of Reduced-Round SipHash
    He, Le
    Yu, Hongbo
    COMPUTER JOURNAL, 2023, 67 (03): : 875 - 883
  • [39] Cryptanalysis of reduced-round MISTY
    Kühn, U
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 325 - 339
  • [40] Cryptanalysis of Reduced-Round DASH
    Shu-Sheng Liu
    Zheng Gong
    Li-Bin Wang
    Journal of Computer Science and Technology, 2013, 28 : 159 - 164