Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR
SAC '98 Proceedings of the Selected Areas in Cryptography
Truncated Differentials and Skipjack
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Flaws in Differential Cryptanalysis of Skipjack
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
The Saturation Attack - A Bait for Twofish
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Square-like Attacks on Reduced Rounds of IDEA
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
A Statistical Saturation Attack against the Block Cipher PRESENT
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
A Cryptanalytic View of the NSA's Skipjack Block Cipher Design
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Square attack on reduced-round Zodiac cipher
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Parallelizing the camellia and SMS4 block ciphers
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4
International Journal of Applied Cryptography
Hi-index | 0.00 |
This paper describes saturation attacks on reduced-round versions of Skipjack. To begin with, we will show how to construct a 16-round distinguisher which distinguishes 16 rounds of Skipjack from a random permutation. The distinguisher is used to attack on 18(5~22) and 23(5~27) rounds of Skipjack. We can also construct a 20-round distinguisher based on the 16-round distinguisher. This distinguisher is used to attack on 22(1~22) and 27(1~27) rounds of Skipjack. The 80- bit user key of 27 rounds of Skipjack can be recovered with 250 chosen plaintexts and 3 驴 275 encryption times.