Analysis of the SMS4 block cipher

  • Authors:
  • Fen Liu;Wen Ji;Lei Hu;Jintai Ding;Shuwang Lv;Andrei Pyshkin;Ralf-Philipp Weinmann

  • Affiliations:
  • State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing, China;State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing, China;State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing, China;Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH;State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing, China;Fachbereich Informatik, Technische Universität Darmstadt, Darmstadt, Germany;Fachbereich Informatik, Technische Universität Darmstadt, Darmstadt, Germany

  • Venue:
  • ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

SMS4 is a 128-bit block cipher used in the WAPI standard for providing data confidentiality in wireless networks. In this paper we investigate and explain the origin of the S-Box employed by the cipher, show that an embedded cipher similar to BES can be obtained for SMS4 and demonstrate the fragility of the cipher design by giving variants that exhibit 264 weak keys. We also show attacks on reduced round versions of the cipher. The best practical attack we found is an integral attack that works on 10 rounds out of 32 rounds with a complexity of 218 operations; it can be extended to 13 rounds using round key guesses, resulting in a complexity of 2114 operations and a data complexity of 216 chosen pairs.