Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia

Yu Sasaki*, Sareh Emami, Deukjo Hong, Ashish Kumar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

15 Citations (Scopus)

Abstract

This paper revisits previous known-key distinguishers on generic Feistel-SP ciphers based on rebound attacks. In this paper first we propose a new 5-round inbound phase that requires 2 c computations, while the previous work requires 2 2c computations (c is a size of the S-box). The new method also improves the number of rounds which can be attacked. Then, we apply the new procedure to Camellia. After several optimizations for Camellia, it is shown that collisions are efficiently generated against 9 rounds out of 18 rounds of Camellia-128 including FL and whitening layers in the compression function modes such as MMO and Miyaguchi-Preneel modes. The attack on Camellia is verified by a machine experiment and the generated results are presented in the paper.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 17th Australasian Conference, ACISP 2012, Proceedings
Pages87-100
Number of pages14
Volume7372 LNCS
DOIs
Publication statusPublished - 2012
Event17th Australasian Conference on Information Security and Privacy, ACISP 2012 - Wollongong, NSW, Australia
Duration: 9 Jul 201211 Jul 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7372 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other17th Australasian Conference on Information Security and Privacy, ACISP 2012
CountryAustralia
CityWollongong, NSW
Period9/07/1211/07/12

Keywords

  • block cipher
  • Camellia
  • Feistel-SP
  • known-key
  • rebound

Fingerprint Dive into the research topics of 'Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia'. Together they form a unique fingerprint.

Cite this