Impossible differential cryptanalysis on tweaked E2

  • Authors:
  • Yuechuan Wei;Xiaoyuan Yang;Chao Li;Weidong Du

  • Affiliations:
  • Electronics Technology Department, Engineering University of Armed Police Force, Xi'an, China;Electronics Technology Department, Engineering University of Armed Police Force, Xi'an, China;Science College of National University of Defense Technology, Changsha, China;Electronics Technology Department, Engineering University of Armed Police Force, Xi'an, China

  • Venue:
  • NSS'12 Proceedings of the 6th international conference on Network and System Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

E2, a 128-bit block cipher, is an AES candidate designed and submitted by NTT corporation. It employs a Feistel structure as global structure and 2-layer Substitution-Permutation Network structure in round function. The conservative structure makes E2 immune to kinds of current cryptanalysis. Previously, there is no result of impossible differential attacks on E2 since it was once supposed to have no more than 5-round impossible differential characteristic. In this paper, the immunity of tweaked E2 (E2 without initial transformation and final transformation) against impossible differential cryptanalysis is evaluated. We present many 6-round impossible differential characteristics of tweaked E2, by using one of which, we perform a 7-round attack on tweaked E2 with 128, 192 and 256 bits key and an 8-round attack on tweaked E2 with 256 bits key. The 7-round attack requires about 2120 chosen plaintexts and 2115.5 7-round encryptions; the 8-round attack needs 2121 chosen plaintexts and less than 2214 8-round encryptions.