Cryptography Reference
In-Depth Information
1. for the first and the second round:
K
1
[
i
]=
E
[
i
]
⊕
C
[0]
⊕
MC
i
K
2
=
E
[
i
+4]
⊕
C
[1]
⊕
MC
i
for
i
=0
,
1
,
2
,
3
,
2. for the remaining eleven rounds (
r
=2
,...,
12) two steps are executed alter-
natively:
(a) for
r
even:
}←{E
[1]
12
,E
[2]
8
,E
[3]
b
3
,E
[0]
b
3
{E
[0]
,E
[1]
,E
[2]
,E
[3]
},
K
r
[
i
]=
E
[
i
]
⊕
C
[
r
]
⊕
MC
i
,
(b) for
r
odd:
E
[7]
b
1
,E
[4]
b
1
,E
[3]
4
,E
[0]
8
{
E
[4]
,E
[5]
,E
[6]
,E
[7]
}←{
}
,
K
r
[
i
]=
E
[
i
+4]
⊕
C
[
r
]
⊕
MC
i
,
for
i
=0
,
1
,
2
,
3
,
mod 2
16
where
C
[0] =
,C
[
k
]=
C
[
k
−
1] +
for
k
=1
,...,
12,
MC
0
=
f53a
f372
,MC
k
=
MC
b
1
k−
1
for
i
=0
,
1
,
2
,
3and
b
a
represents bit-left-rotation by
a
bits within each four-bit nibble.
Example of a differential trail for mCrypton:
acac
i
A
[
i
]
D
[
i
]
D
γ
[
i
]
D
π◦γ
[
i
]
D
τ◦π◦γ
[
i
]
K
[
i
]
i
A
[
i
]
D
[
i
]
D
γ
[
i
]
D
π◦γ
[
i
]
D
τ◦π◦γ
[
i
]
K
[
i
]
0 1 d 3
7 7 0 1
1 b 6 5
e a 3 b
6 1 b 9
e 7 1 f
4 b b 3
c f 4 5
c 0 0 0
c 0 0 0
8 0 0 0
4 0 0 0
c 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
c 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
9 8 2 2
e 6 1 5
a 7 a 2
d d 3 4
0 0 0 5
0 0 6 6
0 0 0 0
7 2 3 0
1 e c 5
f e 1 1
d 6 4 3
a b d 2
e 8 2 7
c a 6 e
a 2 6 d
6 a 4 b
e a 6 f
0 0 0 0
0 0 0 0
0 0 0 0
e 0 0 0
a 0 0 0
6 0 0 0
f 0 0 0
9 e 0 c
8 a e a
b 0 4 6
b f b 1
1
6
1 1 a c
9 1 3 7
5 9 d 2
e 7 1 4
c 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
9 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
8 0 0 0
9 0 0 0
9 0 0 0
1 0 0 0
8 9 9 1
0 0 0 0
0 0 0 0
0 0 0 0
e 0 8 d
c a 4 2
a 5 4 1
2 b c 7
d e 7 f
b 7 3 7
0 d 4 d
3 3 0 2
e 0 0 0
a 0 0 0
6 0 0 0
f 0 0 0
e 0 0 0
c 0 0 0
a 0 0 0
6 0 0 0
e 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
e 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
3 e 4 0
1 7 8 d
1 f 6 c
5 e 4 7
2
7
7 9 5 2
c a 2 8
6 a 3 d
6 8 a 0
8 9 9 1
0 0 0 0
0 0 0 0
0 0 0 0
9 a f d
0 0 0 0
0 0 0 0
0 0 0 0
8 8 b 5
9 a 7 c
9 2 e d
1 a d 9
8 9 9 1
8 a 2 a
b 7 e d
5 c d 9
3 5 3 4
b 8 b 0
c 8 1 9
e 2 9 a
1 b 5 0
f 0 e c
1 7 1 2
9 2 4 7
e 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
6 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
6 0 0 0
4 0 0 0
2 0 0 0
6 0 0 0
6 4 2 6
0 0 0 0
0 0 0 0
0 0 0 0
9 8 c 2
d a b 9
4 0 a 9
5 0 a 7
3
8
6 c b 1
a d 6 f
f 9 b 8
1 6 8 2
8 9 9 1
8 a 2 a
b 7 e d
5 c d 9
d 5 4 b
5 e 9 3
1 1 4 2
d b 2 4
d 4 5 1
1 e a d
1 1 f c
9 a b e
d 1 1 9
4 e 1 a
5 a f b
1 d c e
5 9 5 7
c e d 2
f 3 6 0
d b 2 4
7 7 3 d
e e e d
0 0 2 a
b b c 0
6 4 2 6
0 0 0 0
0 0 0 0
0 0 0 0
f 9 c c
0 0 0 0
0 0 0 0
0 0 0 0
e 9 8 4
d 9 4 c
b 1 c c
7 8 c 8
e d b 7
9 9 1 8
8 4 c c
4 c c 8
3 3 3 4
e 6 8 0
6 b 9 2
5 b 9 9
4
9
8 6 f 0
e 0 d 0
0 0 7 0
0 d 0 7
d 1 1 9
4 e 1 a
5 a f b
1 d c e
1 6 a 7
b c 4 8
e 9 b 4
2 2 9 5
1 f d a
e e 6 b
c 1 4 d
5 1 3 2
1 e c 5
f e 1 1
d 6 4 3
a b d 2
3 d 5 0
3 8 e a
5 4 4 0
b f 1 7
8 5 d 0
9 0 2 6
9 e 5 2
5 e a 9
e d b 7
9 9 1 8
8 4 c c
4 c c 8
7 2 9 9
a 8 d d
1 c f e
6 2 7 1
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
1 3 c 3
8 2 0 9
8 8 3 a
8 c 1 e
5
10
Fig. 8.
The columns in the table represent:
i
- round number,
A
[
i
]-valueofthestate
in round
i
,
D
[
i
] - difference between two states in round
i
,
D
γ
[
i
] - difference between
two states after
γ
in round
i
,
D
π◦γ
[
i
] - difference between two states after
π ◦γ
in round
i
,
D
τ◦π◦γ
[
i
] - difference between two states after
τ ◦ π ◦ γ
in round
i
,
K
[
i
] - subkey in
round
i
. The trail was obtained for
K
=
679ff202d5834e529d9cf7013a4d8218
.
Search WWH ::
Custom Search