Abstract
Impossible differential attacks against Rijndael and Crypton have been proposed up to 5-round. In this paper we expand the impossible differential attacks to 6-round. Although we use the same 4-round impossible differential as in five round attacks, we put this impossible differential in the middle of 6-round. That is, we will consider one round before the impossible differential and one more round after. The complexity of the proposed attack is bigger than that of the Square attack, but still less than that of the exhaustive search.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems,” J. of Cryptology, Vol. 3, pp.27–41, 1990.
E. Biham and N. Keller, “Cryptanalysis of Reduced Variants of Rijndael,” http://csrc.nist.gov/encryption /aes/round2/conf3/aes3papers.html
C. D’Halluin, G. Bijnens, V. Rijmen, and B. Preneel, “Attack on Six Rounds of Crypton,” Proc. of Fast Software Encryption’99, Lecture Notes in Computer Science Vol. 1636, pp. 46–59, Springer-Verlag, 1999.
J. Daemen, L. Knudsen, and V. Rijmen, “The Block Cipher Square,” Proc. of Fast Software Encryption’97, Lecture Notes in Computer Science Vol. 1267, pp. 149–165, 1997.
J. Daemen and V. Rijmen, “AES Proposal: Rijndael,” http://csrc.nist.gov /encryption/aes/rijndael/
C. Lim, “A Revised Version of Crypton-Crypton 1.0,” Proc. of Fast Software Encryption’99, Lecture Notes in Computer Science Vol. 1636, pp. 31–45, Springer-Verlag, 1999.
M. Matsui, “Linear Cryptanalysis Method for DES cipher,” Proc. of Eurocrypt’93, Lecture Notes in Computer Science Vol. 765, pp.386–397, Springer-Verlag, 1993.
H. Seki and T. Kaneko, “Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials,” Proc. of Asiacrypt’99, Lecture Notes in Computer Science Vol. 1716, pp.43–51,1999.
Stefan Lucks, “Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys,” Proc. of Third AES Candidate Conference, AES3, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cheon, J.H., Kim, M., Kim, K., Jung-Yeun, L., Kang, S. (2002). Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_4
Download citation
DOI: https://doi.org/10.1007/3-540-45861-1_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43319-4
Online ISBN: 978-3-540-45861-6
eBook Packages: Springer Book Archive