Abstract
This paper introduces an improved higher order differential attack using chosen higher order differences. We can find a lower order of the higher order differential by choosing higher order differences. It follows that the designers of a block cipher can evaluate the lower bound of the number of chosen plaintexts and the complexity required for the higher order differential attack. We demonstrate an improved higher order differential attack of a CAST cipher with 5 rounds using chosen higher order differences with fewer chosen plaintexts and less complexity. Concretely, we show that a CAST cipher with 5 rounds is breakable with 216 plaintexts and < 224 times the computation of the round function, which half the values reported in Fast Software Encryption Workshop’98. We also show that it is breakable with 213 plaintexts and about 244 times the computation of the round function, which are 1/16-th of those reported in Fast Software Encryption Workshop’97.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
C.M. Adams, “Constructing Symmetric Ciphers Using the CAST Design Procedure,” Designs, Codes and Cryptography, Volume 12, Number 3, November, pp.283–316, Kluwer Academic Publishers, 1997.
C.M. Adams, “The CAST-128 Encryption Algorithm,” Request for Comments (RFC) 2144, Network Working Group, Internet Engineering Task Force, May, 1997.
C.M. Adams and S.E. Tavares, “Designing S-boxes for ciphers resistant to differential cryptanalysis,” In Proceedings of the 3rd symposium on State and Progress of Research in Cryptography, pp. 181–190, 1993.
E. Biham, “New Types of Cryptanalytic Attacks Using Related Keys,” Advances in Cryptology-EUROCRYPT’93, Lecture Notes in Computer Science 765, pp.398–409, Springer-Verlag, 1994.
E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems,” Journal of Cryptology, Volume 4, Number 1, pp.3–72, Springer-Verlag, 1991.
H.M. Heys and S.E. Tavares, “On the security of the CAST encryption algorithm,” Canadian Conference on Electrical and Computer Engineering, pp.332–335, 1994.
T. Jakobsen and L.R. Knudsen, “The Interpolation Attack on Block Ciphers,” Fast Software Encryption, FSE’97, Lecture Notes in Computer Science 1267, pp.28–40, Springer-Verlag, 1997.
L.R. Knudsen, “Truncated and Higher Order Differentials,” Fast Software Encryption-Second International Workshop, Lecture Note in Computer Science 1008, pp. 196–211, Springer-Verlag, 1995.
X. Lai, “Higher Order Derivatives and Differential Cryptanalysis,” Communications and Cryptography, pp.227–233, Kluwer Academic Publishers, 1994.
M. Matsui, “Linear Cryptanalysis Method for DES Cipher,” Advances in Cryptology-EUROCRYPT’93, Lecture Notes in Computer Science 765, pp.386–397, Springer-Verlag, 1994.
S. Moriai, T. Shimoyama, and T. Kaneko, “Higher Order Differential Attack of a CAST Cipher,” Fast Software Encryption, FSE’98, Lecture Notes in Computer Science 1372, pp.17–31, Springer-Verlag, 1998.
K. Nyberg and L.R. Knudsen, “Provable Security Against a Differential Attack,” Journal of Cryptology, Vol.8, No.1, pp.27–37, Springer-Verlag, 1995.
T. Shimoyama, S. Moriai, and T. Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher,” Information Security, First International Workshop, ISW’97, Lecture Notes in Computer Science 1396, pp.32–42, Springer-Verlag, 1998.
H. Tanaka, K. Hisamatsu, and Toshinobu Kaneko, “Higher Order Differential Attack of MISTY without FL functions,“ Technical Report of IEICE, ISEC98-5, The Institute of Electronics, Information and Communication Engineers, 1998. (in Japanese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moriai, S., Shimoyama, T., Kaneko, T. (1999). Higher Order Differential Attack Using Chosen Higher Order Differences. In: Tavares, S., Meijer, H. (eds) Selected Areas in Cryptography. SAC 1998. Lecture Notes in Computer Science, vol 1556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48892-8_9
Download citation
DOI: https://doi.org/10.1007/3-540-48892-8_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65894-8
Online ISBN: 978-3-540-48892-7
eBook Packages: Springer Book Archive