Academia.eduAcademia.edu

Outline

Integral Cryptanalysis on reduced-round Safer

2000

Abstract

In this paper we describe an integral distinguisher over 2 rounds of Safer++. It allows a practical attack against 3 rounds of Safer++128, as well as attacks on 4 rounds of Safer++128 and Safer++256, under the chosen-plaintext hypothesis. These results achieve much lower complexity than the currently known best attacks on Safer++, namely weak-key linear cryptanalysis by Nakahara(8). As a

References (9)

  1. J. Daemen, L. Knudsen, and V. Rijmen. The block cipher square. In E. Biham, ed- itor, Fast Software Encryption 1997, pages 149-165. Springer-Verlag, 1997. Lecture Notes in Computer Science Volume 1267.
  2. J. Daemen and V. Rijmen. AES proposal: Rijndael. In Proc. first AES conference, August 1998. Available on-line from the official AES page: http://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf.
  3. K. Hwang, W. Lee, S. Lee, S. Lee, and J. Lim. Saturation attacks on reduced round skipjack. In J. Daemen and V. Rijmen, editors, Fast Software Encryption (FSE '02), pages 100-111, Berlin, 2002. Springer-Verlag. Lecture Notes in Computer Science Volume 2365.
  4. J. Nakahara Jr, P. S.L.M. Barreto, B. Preneel, and al. Square attacks on reduced- round pes and idea block ciphers. Available at http://eprint.iacr.org/2001/068/.
  5. L. Knudsen and D. Wagner. Integral cryptanalysis. In J. Daemen and V. Rijmen, editors, Fast Software Encryption (FSE '02), pages 112-127, Berlin, 2002. Springer- Verlag. Lecture Notes in Computer Science Volume 2365.
  6. S. Lucks. The saturation attack -a bait for twofish. In M. Matsui, editor, Fast Software Encryption (FSE '01), pages 1-15, Berlin, 2001. Springer-Verlag. Lecture Notes in Computer Science Volume 2355.
  7. J.L. Massey, G.H. Khachatrian, and Kuregian M.K. Nomination of SAFER++ as Candidate Algorithm for NESSIE. Available at http://www.cryptonessie.org.
  8. J. Nakahara, B. Preneel, and al. Linear cryptanalysis of reduced-round safer++. In Proceedings of the second NESSIE Workshop, 2001.
  9. Y. Yeom, S. Park, and I. Kim. On the security of camellia against the square attack. In J. Daemen and V. Rijmen, editors, Fast Software Encryption (FSE '02), pages 89-99, Berlin, 2002. Springer-Verlag. Lecture Notes in Computer Science Volume 2365.