Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On MISTY1 Higher Order Differential Cryptanalysis
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Higher Order Differential Attack of Camellia (II)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
New Block Encryption Algorithm MISTY
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Improved Cryptanalysis of MISTY1
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Truncated Differential Cryptanalysis of Camellia
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Square Attack on Reduced Camellia Cipher
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
On the Security of CAMELLIA against the Square Attack
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Impossible differential cryptanalysis of reduced-round ARIA and Camellia
Journal of Computer Science and Technology
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Improved Impossible Differential Attacks on Large-Block Rijndael
ISC '08 Proceedings of the 11th international conference on Information Security
An Improved Impossible Differential Attack on MISTY1
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Impossible Differential Analysis of Reduced Round CLEFIA
Information Security and Cryptology
Impossible differential cryptanalysis on feistel ciphers with SP and SPS round functions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Cryptanalysis of a generalized unbalanced feistel network structure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Impossible differential cryptanalysis of 13-round CLEFIA-128
Journal of Systems and Software
Security of the SMS4 block cipher against differential cryptanalysis
Journal of Computer Science and Technology - Special issue on natural language processing
The (related-key) impossible boomerang attack and its application to the AES block cipher
Designs, Codes and Cryptography
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
New impossible differential attacks of reduced-round Camellia-192 and Camellia-256
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
New impossible differential cryptanalysis of reduced-round camellia
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
New impossible differential attacks on camellia
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Impossible differential attacks on reduced-round LBlock
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
New truncated differential cryptanalysis on 3d block cipher
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Low data complexity attack on reduced camellia-256
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Zero correlation linear cryptanalysis with reduced data complexity
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
New observations on impossible differential cryptanalysis of reduced-round camellia
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Weak-Key class of MISTY1 for related-key differential attack
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Impossible differential cryptanalysis on tweaked E2
NSS'12 Proceedings of the 6th international conference on Network and System Security
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Hi-index | 0.00 |
We observe that when conducting an impossible differential cryptanalysis on Camellia and MISTY1, their round structures allow us to partially determine whether a candidate pair is useful by guessing only a small fraction of the unknown required subkey bits of a relevant round at a time, instead of guessing all of them at once. Taking advantage of the early abort technique, we improve a previous impossible differential attack on 6-round MISTY1 without the FL functions, and present impossible differential cryptanalysis of 11-round Camellia-128 without the FL functions, 13-round Camellia-192 without the FL functions and 14- round Camellia-256 without the FL functions. The presented results are better than any previously published cryptanalytic results on Camellia and MISTY1 without the FL functions.