Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)

Lei Wei*, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

27 Citations (Scopus)

Abstract

This paper presents ongoing work towards extensions of meet-in-the-middle (MITM) attacks on block ciphers. Exploring developments in MITM attacks in hash analysis such as: (i) the splice-and-cut technique; (ii) the indirect-partial-matching technique. Our first contribution is that we show corrections to previous cryptanalysis and point out that the key schedule is more vulnerable to MITM attacks than previously reported. Secondly we further improve the time complexities of previous attacks with (i) and (ii), now the 80-bit secret key of the full rounds KTANTAN-{32,48,64} can be recovered at time complexity of 272.9, 273.8 and 274.4 respectively, each requiring 4 chosen-plaintexts.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings
EditorsUdaya Parampalli, Philip Hawkes
Place of PublicationHeidelberg
PublisherSpringer, Springer Nature
Pages433-438
Number of pages6
ISBN (Electronic)9783642224973
ISBN (Print)9783642224966
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event16th Australasian Conference on Information Security and Privacy, ACISP 2011 - Melbourne, VIC, Australia
Duration: 11 Jul 201113 Jul 2011

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Berlin Heidelberg
Volume6812
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other16th Australasian Conference on Information Security and Privacy, ACISP 2011
CountryAustralia
CityMelbourne, VIC
Period11/07/1113/07/11

Fingerprint Dive into the research topics of 'Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)'. Together they form a unique fingerprint.

Cite this