中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 会议论文
Title:
meet-in-the-middle attack on reduced versions of the camellia block cipher
Author: Lu Jiqiang ; Wei Yongzhuang ; Pasalic Enes ; Fouque Pierre-Alain
Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Conference Name: 7th International Workshop on Security, IWSEC 2012
Conference Date: November 7, 2012 - November 9, 2012
Issued Date: 2012
Conference Place: Fukuoka, Japan
Keyword: Cryptography
Indexed Type: EI
ISSN: 0302-9743
ISBN: 9783642341168
Department: (1) Institute for Infocomm Research Agency for Science Technology and Research 1 Fusionopolis Way Singapore 138632 Singapore; (2) Guilin University of Electronic Technology Guilin City Guangxi Province 541004 China; (3) State Key Lab of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China; (4) University of Primorska FAMNIT Koper Slovenia; (5) Département d'Informatique École Normale Supérieure 45 Rue d'Ulm Paris 75005 France
Abstract: The Camellia block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits long, which employs a total of 18 rounds for a 128-bit key and 24 rounds for a 192 or 256-bit key. It is a Japanese CRYPTREC-recommended e-government cipher, a European NESSIE selected cipher, and an ISO international standard. In this paper, we describe a few 5 and 6-round properties of Camellia and finally use them to give (higher-order) meet-in-the-middle attacks on 10-round Camellia with the FL/FL-1 functions under 128 key bits, 11-round Camellia with the FL/FL-1 and whitening functions under 192 key bits and 12-round Camellia with the FL/FL-1 and whitening functions under 256 key bits. © Springer-Verlag Berlin Heidelberg 2012.
English Abstract: The Camellia block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits long, which employs a total of 18 rounds for a 128-bit key and 24 rounds for a 192 or 256-bit key. It is a Japanese CRYPTREC-recommended e-government cipher, a European NESSIE selected cipher, and an ISO international standard. In this paper, we describe a few 5 and 6-round properties of Camellia and finally use them to give (higher-order) meet-in-the-middle attacks on 10-round Camellia with the FL/FL-1 functions under 128 key bits, 11-round Camellia with the FL/FL-1 and whitening functions under 192 key bits and 12-round Camellia with the FL/FL-1 and whitening functions under 256 key bits. © Springer-Verlag Berlin Heidelberg 2012.
Language: 英语
Content Type: 会议论文
URI: http://ir.iscas.ac.cn/handle/311060/15852
Appears in Collections:软件所图书馆_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Lu Jiqiang,Wei Yongzhuang,Pasalic Enes,et al. meet-in-the-middle attack on reduced versions of the camellia block cipher[C]. 见:7th International Workshop on Security, IWSEC 2012. Fukuoka, Japan. November 7, 2012 - November 9, 2012.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Lu Jiqiang]'s Articles
[Wei Yongzhuang]'s Articles
[Pasalic Enes]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Lu Jiqiang]‘s Articles
[Wei Yongzhuang]‘s Articles
[Pasalic Enes]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace