RELATED-KEY ATTACK AGAINST TRIPLE ENCRYPTION BASED ON FIXED POINTS

被引:0
|
作者
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
关键词
Triple-encryption; Cryptanalysis; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Triple encryption was proposed to increase the security of single encryption when the key is too short. In the past, there have been several attacks in this encryption mode. When triple encryption is based on two keys, Merkle and Hellman proposed a subtle meet-in-the-middle attack which can break it at a price similar to breaking single encryption (but with nearly all the code book). When triple encryption is based on three keys, Kelsey, Schneier, and Wagner proposed a related-key attack which can break it at a price similar to breaking single encryption. In this paper, we propose a new related-key attack against triple encryption which compares to breaking single encryption in the two cases. Our attack against two-key triple-encryption has exactly the same performances as a meet-in-the-middle on double-encryption. It is based on the discovery of fixed points in a decrypt-encrypt sequence using related keys. In the two-key case, it is comparable to the Merkle-Hellman attack (except that is uses related keys). In the three-key case, it has a higher complexity than the Kelsey-Schneier-Wagner attack but can live with known plaintexts.
引用
收藏
页码:59 / 67
页数:9
相关论文
共 50 条
  • [21] A weak key class of XTEA for a related-key rectangle attack
    Lee, Eunjin
    Hong, Deukjo
    Chang, Donghoon
    Hong, Seokhie
    Lim, Jongin
    PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 286 - +
  • [22] ON THE RELATED-KEY ATTACKS AGAINST AES
    Daemen, Joan
    Rijmen, Vincent
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (04): : 395 - 400
  • [23] Public-Key Encryption Resilient to Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 182 - 196
  • [24] Distinguisher and Related-Key Attack on HALFLOOP-96
    Liu, Jinpeng
    Sun, Ling
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2023, PT I, 2024, 14561 : 19 - 40
  • [25] Related-Key Boomerang Attack on Block Cipher SQUARE
    Koo, Bonwook
    Yeom, Yongjin
    Song, Junghwan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 3 - 9
  • [26] Related-key rectangle attack on MD-64
    Science and Technology on Information Assurance Laboratory, Beijing
    100072, China
    不详
    450001, China
    不详
    611830, China
    Dianzi Yu Xinxi Xuebao, 12 (2845-2851):
  • [27] Related-key square attack on AES-192
    Chen, J., 1600, Univ. of Electronic Science and Technology of China (42):
  • [28] Quantum Related-Key Attack Based on Simon's Algorithm and Its Applications
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (05):
  • [29] A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules
    Pudovkina, Marina
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 90 - 101
  • [30] Ciphers secure against related-key attacks
    Lucks, S
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 359 - 370