1. Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia
- Author
-
Xiaoyun Wang, Keting Jia, Xiaoyang Dong, Leibo Li, Shandong University, Tsinghua University [Beijing], Institute for Advanced Study [Tsinghua], Cryptanalyse (CRYPT), Laboratoire Franco-Chinois d'Informatique, d'Automatique et de Mathématiques Appliquées (LIAMA), Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-Institut National de la Recherche Agronomique (INRA)-Chinese Academy of Sciences [Changchun Branch] (CAS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institute of Automation - Chinese Academy of Sciences-Centre National de la Recherche Scientifique (CNRS)-Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-Institut National de la Recherche Agronomique (INRA)-Chinese Academy of Sciences [Changchun Branch] (CAS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institute of Automation - Chinese Academy of Sciences-Centre National de la Recherche Scientifique (CNRS)-Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria), IACR, and Tsinghua University [Beijing] (THU)
- Subjects
Discrete mathematics ,Differential cryptanalysis ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,law.invention ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,010201 computation theory & mathematics ,law ,CLEFIA ,Camellia ,0202 electrical engineering, electronic engineering, information engineering ,Truncated differential cryptanalysis ,Cryptanalysis ,Meet in the middle ,Differential (mathematics) ,ComputingMilieux_MISCELLANEOUS ,Block cipher ,Mathematics - Abstract
As one of the generalizations of differential cryptanalysis, the truncated differential cryptanalysis has become a powerful toolkit to evaluate the security of block ciphers. In this article, taking advantage of the meet-in-the-middle like technique, we introduce a new method to construct truncated differential characteristics of block ciphers. Based on the method, we propose 10-round and 8-round truncated differential characteristics for CLEFIA and Camellia, respectively, which are ISO standard block ciphers. Applying the 10-round truncated differential characteristic for CLEFIA, we launch attacks on 14/14/15-round CLEFIA-128/192/256 with \(2^{108}\), \(2^{135}\) and \(2^{203}\) encryptions, respectively. For Camellia, we utilize the 8-round truncated differential to attack 11/12-round Camellia-128/192 including the \(FL/FL^{-1}\) and whiten layers with \(2^{121.3}\) and \(2^{185.3}\) encryptions. As far as we know, most of the cases are the best results of these attacks on both ciphers.
- Published
- 2015
- Full Text
- View/download PDF