Impossible differential cryptanalysis on feistel ciphers with SP and SPS round functions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
New impossible differential attacks of reduced-round Camellia-192 and Camellia-256
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Low data complexity attack on reduced camellia-256
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Impossible differential cryptanalysis on tweaked E2
NSS'12 Proceedings of the 6th international conference on Network and System Security
Hi-index | 0.00 |
The block cipher Camellia has now been adopted as an international standard by ISO/IEC, and it has also been selected to be Japanese CRYPTREC e-government recommended cipher and in the NESSIE block cipher portfolio. Most recently, Wu et al constructed some 8-round impossible differentials of Camellia, and presented an attack on 12-round Camellia-192/256 in [5]. Later in [6], Lu et al improved the above attack by using the same 8-round impossible differential and some new observations on the diffusion transformation of Camellia. Considering that all these previously known impossible differential attacks on Camellia have not taken the key scheduling algorithm into account, in this paper we exploit the relations between the round subkeys of Camellia, together with some novel techniques in the key recovery process to improve the impossible differential attack on Camellia up to 12-round Camellia-128 and 16-round Camellia-256. The data complexities of the two attacks are 265 and 289 respectively, and the time complexities of the two attacks are less than 2111.5 and 2222.1 respectively. The presented results are better than any previously published cryptanalytic results on Camellia without the FL/FL 驴 1 functions and whitening layers.