Impossible Differential Cryptanalysis of CLEFIA-128/192/256
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [9]
  • |
  • Related [20]
  • |
  • Cited by [3]
  • | |
  • Comments
    Abstract:

    An improved impossible differential attack on the block cipher CLEFIA is presented. CLEFIA was proposed by Sony Corporation at FSE 2007. Combining some observations with new tricks, the wrong keys are filtered out more efficiently, and the original impossible differential attack on 11-round CLEFIA-192/256 published by the designers, is extended to CLEFIA-128/192/256, with about 2103.1 encryptions and 2103.1 chosen plaintexts. By putting more constraint conditions on plaintext pairs, we present an attack on 12-round CLEFIA for all three key lengths with 2119.1 encryptions and 2119.1 chosen plaintexts. Moreover, a birthday sieve method is introduced to decrease the complexity of the precomputation. And an error about the time complexity evaluation in Tsunoo et al.’s attack on 12-round CLEFIA is pointed out and corrected.

    Reference
    [1] Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stern J, ed. Advances in Cryptology—EUROCRYPT’99. LNCS 1592, Berlin: Springer-Verlag, 1999. 12-23.
    [2] Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T. The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov A, ed. Proc. of the Fast Software Encryption (FSE 2007). LNCS 4593, Berlin: Springer-Verlag, 2007. 181-195.
    [3] Sony Corporation. The 128-bit blockcipher CLEFIA: Algorithm specification. Revision 1.0, On-Line document, 2007. http://www.sony.net/Products/clefia/technical/data/clefia-spec-1.0.pdf
    [4] Sony Corporation. The 128-bit blockcipher CLEFIA: Security and performance evaluations. Revision 1.0, On-Line document, 2007. http://www.sony.co.jp/Products/clefia/technical/data/clefia-eval-1.0.pdf
    [5] Chen H, Wu WL, Feng DG. Differential fault analysis on CLEFIA. In: Qing S, Imai H, Wang G, eds. Proc. of the Int’l Conf. on Information and Communications Security (ICICS 2007). LNCS 4861, Berlin: Springer-Verlag, 2007. 284-295.
    [6] Tsunoo Y, Tsujihara E, Shigeri M, Saito T, Suzaki T, Kubo H. Impossible differential cryptanalysis of CLEFIA. In: Nyberg K, ed. Proc. of the Fast Software Encryption (FSE 2008). LNCS 5086, Berlin: Springer-Verlag, 2008. 398-411.
    [7] Wang W, Wang XY. Improved impossible differential cryptanalysis of CLEFIA. Report 2007/466. Cryptology ePrint Archive, 2007. http://eprint.iacr.org/2007/466
    [8] Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991,4(1):3-72.
    [9] Menezes AJ, Oorschot PC, Vanstone SA. Handbook of Applied Cryptography. 5th ed., CRC Press, 2001. 369-370.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

王薇,王小云. CLEFIA-128/192/256的不可能差分分析.软件学报,2009,20(9):2587-2596

Copy
Share
Article Metrics
  • Abstract:5206
  • PDF: 6844
  • HTML: 0
  • Cited by: 0
History
  • Received:April 26,2008
  • Revised:January 14,2009
You are the first2037936Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063