The Design of Rijndael
Higher Order Differential Attack of Camellia (II)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Structural Cryptanalysis of SASAS
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Improved Cryptanalysis of Rijndael
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
The Saturation Attack - A Bait for Twofish
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Impossible differential cryptanalysis of reduced-round ARIA and Camellia
Journal of Computer Science and Technology
Bit-Pattern Based Integral Attack
Fast Software Encryption
New Cryptanalysis of Block Ciphers with Low Algebraic Degree
Fast Software Encryption
A meet-in-the-middle attack on reduced-round ARIA
Journal of Systems and Software
Linear cryptanalysis of ARIA block cipher
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Integral attacks on reduced-round ARIA block cipher
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Hi-index | 0.00 |
This paper studies the security of the block cipher ARIA against integral attack. The designers believe that determining whether any given byte position is balanced or not after 3 rounds of encryption is not possible. However, by determining the times that each element of the output of the second round appears is an even integer, we find some 3-round integral distinguishers of ARIA in this paper, which may lead to possible attacks on 4, 5 and 6-round ARIA. Both the data and time complexities of 4-round attack are 225; the data and time complexities of 5-round attack are 227.2 and 276.7, respectively; the data and time complexities of 6-round attack are 2124.4 and 2172.4, respectively. Moreover, the 4 and 5-round attacks have the lowest data and time complexities compared to existing attacks on ARIA. Our results also show that the choice of S-box and different order of S-boxes do have influence on integral attacks.