Skip to main content

Strength of ISTY1 without FL Function for Higher Order Differential Attack

  • Conference paper
  • First Online:
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC 1999)

Abstract

The encryption algorithm MISTY is a “provably secure” one against Linear and Differential cryptanalysis. Since the designer showed 3 round MISTY1 without FL function is provable secure, we omit FL to estimate the strength for Higher Order Differential Attack. This attack is a chosen plain text attack and uses the value of higher order differential of output to derive an attacking equation for sub-keys. The value depends on the degree of output and the degree depends on the choice of plain texts. We show that the effective chosen plain text and 5 round MISTY1 without FL is attackable using 11 different 7th order differentials. And we show the attacks to remaining sub-keys by the determined sub-keys and intermediate values. Intermediate value is a constant in the process of encryption. As the result, we can determine all sub-key in 5 round MISTY1 without FL.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Matui, “Block Encryption Algorithm MISTY”, ISEC96-11(1996-07)

    Google Scholar 

  2. Shimoyama, Moriai, Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher”, ISEC97-29(1997-09)

    Google Scholar 

  3. Moriai, Shimoyama, Kaneko, “Higher Order Attack of a CAST Cipher (II)”, SCIS98-12E

    Google Scholar 

  4. Jakobsen, Knudsen, “The Interpolation Attack on Block Cipher”, FSE-4th International Workshop, LNCS.1008

    Google Scholar 

  5. Nyberg, Knudsen, “Provable Security against Differential Cryptanalysis”, Journal of Cryptology, Vol.8-no.1 (1995)

    Google Scholar 

  6. Shimoyama, Moriai, Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher”, 1997I Information Security Workshop

    Google Scholar 

  7. Matsui, “New Structure of Block Ciphers with Provable Security against Differential and Linear cryptanalysis”, FSE-3rd International Workshop, LNCS.1039

    Google Scholar 

  8. Moriai, Shimoyama, Kaneko, “Higher Order Attack of a CAST Cipher”, FSE-4th International Workshop, LNCS.1372

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tanaka, H., Hisamatsu, K., Kaneko, T. (1999). Strength of ISTY1 without FL Function for Higher Order Differential Attack. In: Fossorier, M., Imai, H., Lin, S., Poli, A. (eds) Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. AAECC 1999. Lecture Notes in Computer Science, vol 1719. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46796-3_22

Download citation

  • DOI: https://doi.org/10.1007/3-540-46796-3_22

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66723-0

  • Online ISBN: 978-3-540-46796-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics