Impossible Differential Cryptanalysis of reduced-round TEA and XTEA

被引:0
|
作者
Hajari, Masroor [1 ]
Azimi, Seyyed Arash [1 ]
Aghdaie, Poorya [2 ]
Salmasizadeh, Mahmoud [3 ]
Aref, Mohammad Reza [4 ]
机构
[1] Sharif Univ Technol, Informat Syst & Secur Lab, Tehran, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[3] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
[4] Sharif Univ Technol, Dept Elect Engn, Informat Syst & Secur Lab, Tehran, Iran
关键词
Impossible Differential Cryptanalysis; Lightweight; Block Cipher; TEA; XTEA; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
TEA and XTEA are two lightweight Feistel block ciphers, each of which has a block size of 64 bits and a key size of 128 bits. These two ciphers have ARX structure, i.e. their round functions consist of modular addition, shift and XOR to be exact. Since each operation of TEA and XTEA can be done in a bitwise fashion, we are able to use early abort technique in the impossible differential attack that helps us to remove inappropriate pairs as soon as possible, hence decreasing time complexity. In this paper we present two new 15-round impossible differential characteristics, resulting in the first known impossible differential cryptanalysis mounted on 19 rounds of TEA and 25 rounds of XTEA.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [21] Differential cryptanalysis of TEA and XTEA
    Hong, S
    Hong, D
    Ko, Y
    Chang, D
    Lee, W
    Lee, S
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 402 - 417
  • [22] Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256
    Liu, Ya
    Gu, Dawu
    Liu, Zhiqiang
    Li, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (11) : 2451 - 2458
  • [23] Impossible Differential Attack on Reduced-Round TWINE
    Zheng, Xuexin
    Jia, Keting
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 123 - 143
  • [24] Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher
    Sadeghi, Sadegh
    Bagheri, Nasour
    IET INFORMATION SECURITY, 2018, 12 (04) : 314 - 325
  • [25] Biased differential distinguisher - Cryptanalysis of reduced-round SKINNY
    Dunkelman, Orr
    Huang, Senyang
    Lambooij, Eran
    Perle, Stav
    INFORMATION AND COMPUTATION, 2021, 281
  • [26] Cryptanalysis of Reduced-Round Whirlwind
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 20 - 38
  • [27] Cryptanalysis of Reduced-Round DASH
    刘树生
    龚征
    王立斌
    Journal of Computer Science & Technology, 2013, 28 (01) : 159 - 164
  • [28] Cryptanalysis of Reduced-Round SipHash
    He, Le
    Yu, Hongbo
    COMPUTER JOURNAL, 2023, 67 (03): : 875 - 883
  • [29] Cryptanalysis of reduced-round MISTY
    Kühn, U
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 325 - 339
  • [30] Cryptanalysis of Reduced-Round SPECK
    Ren, Jiongjiong
    Chen, Shaozhen
    IEEE ACCESS, 2019, 7 : 63045 - 63056