Skip to main content

New Weak-Key Classes of IDEA

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Included in the following conference series:

Abstract

This paper presents a large collection of new weak-key classes for the IDEA cipher. The classes presented in this paper contain 253-264 weak keys (as compared with 251 differential weak keys presented by Daemen at CRYPTO’93 and 263 differential-linear weak-keys presented by Hawkes at EUROCRYPT’98). The novelty of our approach is in the use of boomerang distinguishers for the weak-key class membership test. We also show large weak-key classes for reduced-round versions of IDEA.

The work described in this paper has been supported in part by the Commission of the European Communities through the IST Programme under Contract IST-1999-12324 and in part by the Concerted Research Action (GOA) project Mefisto 2000/06 of the Flemish Government.

Sponsored in part by the Concerted Research Action (GOA) project Mefisto 2000/06 of the Flemish Government.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biham, E., Biryukov, A., Shamir, A.: Miss-in-the-Middle Attacks on IDEA, Khufu and Khafre, 6th Fast Software Encryption Workshop, LNCS 1636, L.R. Knudsen, Ed., Springer-Verlag, 1999, 124–138.

    Chapter  Google Scholar 

  2. Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.

    Google Scholar 

  3. Borst, J., Knudsen, L.R., Rijmen, V.: Two Attacks on Reduced IDEA (extended abstract), Advances in Cryptology, Eurocrypt’97, LNCS 1233, W. Fumy, Ed., Springer-Verlag, 1997, 1–13.

    Google Scholar 

  4. Daemen, J., Govaerts, R., Vandewalle, J.: Weak Keys for IDEA, Advances in Cryptology, Crypto’93, LNCS 773, D.R. Stinson, Ed., Springer-Verlag, 1994, 224–231.

    Google Scholar 

  5. Hawkes, P.: Differential-Linear Weak Key Classes of IDEA, Advances in Cryptology, Eurocrypt’98, LNCS 1403, K. Nyberg, Ed., Springer-Verlag, 1998, 112–126.

    Chapter  Google Scholar 

  6. Hawkes, P., O’Connor, L.: On Applying Linear Cryptanalysis to IDEA, Advances in Cryptology, Asiacrypt’96, LNCS 1163, K. Kim and T. Matsumoto, Eds., Springer-Verlag, 1996, 105–115.

    Chapter  Google Scholar 

  7. Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER and Triple-DES, Advances in Cryptology, Crypto’96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, 237–251.

    Google Scholar 

  8. Lai, X.: On the Design and Security of Block Ciphers, Hartung-Gorre Verlag, Konstanz, 1992.

    Google Scholar 

  9. Lai, X., Massey, J.L.: A Proposal for a New Block Encryption Standard, Advances in Cryptology, Eurocrypt’90, LNCS 473, I.B. Damgℴard, Ed., Springer-Verlag, 1990, 389–404.

    Google Scholar 

  10. Lai, X., Massey, J.L., Murphy, S.: Markov Ciphers and Differential Cryptanalysis, Advances in Cryptology, Eurocrypt’91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, 17–38.

    Google Scholar 

  11. Meier, W.: On the Security of the IDEA Block Cipher, Advances in Cryptology, Eurocrypt’93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, 371–385.

    Google Scholar 

  12. NESSIE Project-New European Schemes for Signatures, Integrity and Encryption-available at http://cryptonessie.org.

  13. Wagner, D.: The Boomerang Attack, 6th Fast Software Encryption Workshop, LNCS 1636, L.R. Knudsen, Ed., Springer-Verlag, 1999, 156–170.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Biryukov, A., Nakahara, J., Preneel, B., Vandewalle, J. (2002). New Weak-Key Classes of IDEA. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_27

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_27

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics