A proposal for a new block encryption standard
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On the security of the IDEA block cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
On Applying Linear Cryptanalysis to IDEA
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Miss in the Middle Attacks on IDEA and Khufu
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Markov ciphers and differential cryptanalysis
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A Unified Approach to Related-Key Attacks
Fast Software Encryption
The Key-Dependent Attack on Block Ciphers
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Improved DST Cryptanalysis of IDEA
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
A security framework for e-health service authentication and e-health data transmission
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
New cryptanalytic results on IDEA
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
A related-key rectangle attack on the full KASUMI
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
New combined attacks on block ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
New attacks against reduced-round versions of IDEA
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Related-Key boomerang and rectangle attacks
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Faster variants of the MESH block ciphers
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Narrow-Bicliques: cryptanalysis of full IDEA
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Security and Communication Networks
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
On the (in)security of IDEA in various hashing modes
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Collisions for the WIDEA-8 compression function
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Hi-index | 0.00 |
This paper presents a large collection of new weak-key classes for the IDEA cipher. The classes presented in this paper contain 253-264 weak keys (as compared with 251 differential weak keys presented by Daemen at CRYPTO'93 and 263 differential-linear weak-keys presented by Hawkes at EUROCRYPT'98). The novelty of our approach is in the use of boomerang distinguishers for the weak-key class membership test. We also show large weak-key classes for reduced-round versions of IDEA.