Abstract
The encryption algorithm MISTY is a “provably secure” one against Linear and Differential cryptanalysis. Since the designer showed 3 round MISTY1 without FL function is provable secure, we omit FL to estimate the strength for Higher Order Differential Attack. This attack is a chosen plain text attack and uses the value of higher order differential of output to derive an attacking equation for sub-keys. The value depends on the degree of output and the degree depends on the choice of plain texts. We show that the effective chosen plain text and 5 round MISTY1 without FL is attackable using 11 different 7th order differentials. And we show the attacks to remaining sub-keys by the determined sub-keys and intermediate values. Intermediate value is a constant in the process of encryption. As the result, we can determine all sub-key in 5 round MISTY1 without FL.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Matui, “Block Encryption Algorithm MISTY”, ISEC96-11(1996-07)
Shimoyama, Moriai, Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher”, ISEC97-29(1997-09)
Moriai, Shimoyama, Kaneko, “Higher Order Attack of a CAST Cipher (II)”, SCIS98-12E
Jakobsen, Knudsen, “The Interpolation Attack on Block Cipher”, FSE-4th International Workshop, LNCS.1008
Nyberg, Knudsen, “Provable Security against Differential Cryptanalysis”, Journal of Cryptology, Vol.8-no.1 (1995)
Shimoyama, Moriai, Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher”, 1997I Information Security Workshop
Matsui, “New Structure of Block Ciphers with Provable Security against Differential and Linear cryptanalysis”, FSE-3rd International Workshop, LNCS.1039
Moriai, Shimoyama, Kaneko, “Higher Order Attack of a CAST Cipher”, FSE-4th International Workshop, LNCS.1372
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tanaka, H., Hisamatsu, K., Kaneko, T. (1999). Strength of ISTY1 without FL Function for Higher Order Differential Attack. In: Fossorier, M., Imai, H., Lin, S., Poli, A. (eds) Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. AAECC 1999. Lecture Notes in Computer Science, vol 1719. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46796-3_22
Download citation
DOI: https://doi.org/10.1007/3-540-46796-3_22
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66723-0
Online ISBN: 978-3-540-46796-0
eBook Packages: Springer Book Archive