Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Design of Rijndael
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Improved Impossible Differentials on Twofish
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Miss in the Middle Attacks on IDEA and Khufu
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Impossible Differential Cryptanalysis of Zodiac
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
3D: A Three-Dimensional Block Cipher
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Known-key distinguishers for some block ciphers
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Known-Key distinguisher on round-reduced 3d block cipher
WISA'11 Proceedings of the 12th international conference on Information Security Applications
New truncated differential cryptanalysis on 3d block cipher
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Hi-index | 0.00 |
The contributions of this paper are new 6-round impossibledifferential (ID) and 9.75-round known-key distinguishers for the 3D block cipher. The former was constructed using the miss-in-the-middle technique, while the latter with an inside-out technique. These are the largest ID and known-key distinguishers obtained for the 3D cipher so far, based on the fact that complete diffusion is achieved after three full rounds. Thus, we exploited the slow diffusion in 3D to attack the largest possible number of rounds. The ID distinguishers lead to improved attacks on 10-round variants of the 3D cipher, in the single-key (non related-key) model. These results represent the currently best attacks reported on reduced-round 3D cipher.