New types of cryptanalytic attacks using related keys
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
New Block Encryption Algorithm MISTY
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Security of the Five-Round KASUMI Type Permutation
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Related-key rectangle attack on 43-round SHACAL-2
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
On the pseudorandomness of KASUMI type permutations
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
The delicate issues of addition with respect to XOR differences
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Pseudorandom functions and permutations provably secure against related-key attacks
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
A related-key rectangle attack on the full KASUMI
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Related-key and meet-in-the-middle attacks on Triple-DES and DES-EXE
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
How to enhance the security of the 3GPP confidentiality and integrity algorithms
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
On related-key attacks and KASUMI: the case of a5/3
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Related-key rectangle attacks on reduced AES-192 and AES-256
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Hi-index | 0.00 |
This paper describes related key attacks on five and six round KASUMI. The five round attack requires the encryption of approximately 219 chosen plaintext pairs X and X* under keys K and K* respectively where K and K* differ in only one bit, and requires a maximum of a little over 233 trials to recover the entire key. The six round attack requires a smaller number of chosen plaintext encryptions than the five round attack, and recovers the entire key in a maximum of 2112 trials.