Title: | meet-in-the-middle attack on reduced versions of the camellia block cipher |
Author: | Lu Jiqiang
; Wei Yongzhuang
; Pasalic Enes
; Fouque Pierre-Alain
|
Source: | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
Conference Name: | 7th International Workshop on Security, IWSEC 2012
|
Conference Date: | November 7, 2012 - November 9, 2012
|
Issued Date: | 2012
|
Conference Place: | Fukuoka, Japan
|
Keyword: | Cryptography
|
Indexed Type: | EI
|
ISSN: | 0302-9743
|
ISBN: | 9783642341168
|
Department: | (1) Institute for Infocomm Research Agency for Science Technology and Research 1 Fusionopolis Way Singapore 138632 Singapore; (2) Guilin University of Electronic Technology Guilin City Guangxi Province 541004 China; (3) State Key Lab of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China; (4) University of Primorska FAMNIT Koper Slovenia; (5) Département d'Informatique École Normale Supérieure 45 Rue d'Ulm Paris 75005 France
|
Abstract: | The Camellia block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits long, which employs a total of 18 rounds for a 128-bit key and 24 rounds for a 192 or 256-bit key. It is a Japanese CRYPTREC-recommended e-government cipher, a European NESSIE selected cipher, and an ISO international standard. In this paper, we describe a few 5 and 6-round properties of Camellia and finally use them to give (higher-order) meet-in-the-middle attacks on 10-round Camellia with the FL/FL-1 functions under 128 key bits, 11-round Camellia with the FL/FL-1 and whitening functions under 192 key bits and 12-round Camellia with the FL/FL-1 and whitening functions under 256 key bits. © Springer-Verlag Berlin Heidelberg 2012. |
English Abstract: | The Camellia block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits long, which employs a total of 18 rounds for a 128-bit key and 24 rounds for a 192 or 256-bit key. It is a Japanese CRYPTREC-recommended e-government cipher, a European NESSIE selected cipher, and an ISO international standard. In this paper, we describe a few 5 and 6-round properties of Camellia and finally use them to give (higher-order) meet-in-the-middle attacks on 10-round Camellia with the FL/FL-1 functions under 128 key bits, 11-round Camellia with the FL/FL-1 and whitening functions under 192 key bits and 12-round Camellia with the FL/FL-1 and whitening functions under 256 key bits. © Springer-Verlag Berlin Heidelberg 2012. |
Language: | 英语
|
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/15852
|
Appears in Collections: | 软件所图书馆_会议论文
|
There are no files associated with this item.
|
Recommended Citation: |
Lu Jiqiang,Wei Yongzhuang,Pasalic Enes,et al. meet-in-the-middle attack on reduced versions of the camellia block cipher[C]. 见:7th International Workshop on Security, IWSEC 2012. Fukuoka, Japan. November 7, 2012 - November 9, 2012.
|
|
|