Cryptography Reference
In-Depth Information
6
Conclusions
We have examined the application of the differential trails in analysis of ciphers
that are used for compression function constructions. We have considered both
the known-key and chosen-key models. Specifically, we have analyzed the colli-
sion resistance of all compression functions based on single block ciphers as well
as the four known double-block compression functions, when specific differential
trails for the underlying ciphers can be built. Furthermore, we have presented
differential distinguishers for Crypton, Hierocrypt-3, SAFER++, and Square.
For these ciphers, we have shown that when the attack model is switched from
secret-key to open-key, the number of rounds that can be attacked increases.
We have given as well a formal proof of lower bound of constructing pair that
follow a truncated trail in the case of a random permutation. Our results are
summarized in Table 1.
The area of open-key distinguishers is largely unexplored. Finding
similar distinguishers based on related-key differentials remains an open
problem.
Acknowledgement. The authors would like to thank anonymous reviewers for
their helpful comments.
Ivica Nikolic is supported by the Fonds National de la Recherche Luxembourg
grant TR-PHD-BFR07-031. Josef Pieprzyk and Ron Steinfield are supported
by Australian Research Council grant DP0987734. Przemyslaw Sokolowski is
supported by cotutelle Macquarie University Research Excellence Scholarship
(cotutelle MQRES) and partially supported by Ministry of Science and Higher
Education grant N N206 2701 33, 2007-2010.
References
1. Barreto, P.S.L.M., Rijmen, V., Nakahara Jr., J., Preneel, B., Vandewalle, J., Kim,
H.Y.: Improved SQUARE Attacks Against Reduced-Round HIEROCRYPT. In:
Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 165-173. Springer, Heidelberg
(2002)
2. Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Frame-
work for Code-Based Game-Playing Proofs. In: Vaudenay, S. (ed.) EUROCRYPT
2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
3. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In:
Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2-21.
Springer, Heidelberg (1991)
4. Biryukov, A., Canniere, C.D., Dellkrantz, G.: Cryptanalysis of SAFER++. In:
Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 195-211. Springer, Heidelberg
(2003)
5. Biryukov, A., Khovratovich, D., Nikolic, I.: Distinguisher and Related-Key At-
tack on the Full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677,
pp. 231-249. Springer, Heidelberg (2009)
 
Search WWH ::




Custom Search