On the strength of KASUMI without FL functions against Higher Order Differential Attack

The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Tanaka, Hidema, Ishii, Chikashi, Kaneko, Toshinobu
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 21
container_issue
container_start_page 14
container_title
container_volume 2015
creator Tanaka, Hidema
Ishii, Chikashi
Kaneko, Toshinobu
description The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI without FL functions. As the result, we can attack it using 2nd order differentials. This attack needs about 1,416 chosen plaintexts.
doi_str_mv 10.1007/3-540-45247-8_2
format Book Chapter
fullrecord <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_785643</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3072530_8_23</sourcerecordid><originalsourceid>FETCH-LOGICAL-p1782-35cac37a11fa20dc3611b421706498b49fae7d61285111467b79de10ef1064ec3</originalsourceid><addsrcrecordid>eNotUE1PGzEQNS1UBMi5V0s9u_V47PXuMYIGUINyAMTRchw7u026m9qOEP8e52MOM5qZ955mHiHfgf8EzvUvZEpyJpWQmtVGnJErLINDX38hI6gAGKJsvp4WoGtRnZMRRy5YoyV-IyMB2CCiUpdknNJfXgIFNo0akbd5T3PracrR96vc0iHQP5Pn16dH-t7ldthlOp3RsOtd7oY-UbuyXZ8yfehWrY90Hpcl33Uh-MLPnd3QSc7WrW_IRbCb5Menek1ep79fbh_YbH7_eDuZse3-UIbKWYfaAgQr-NJheWchBWheyaZeyCZYr5cViFoBgKz0QjdLD9wHKAjv8Jr8OOpubXJ2E6LtXZfMNnb_bPwwulaVxIJiR1Qqi37lo1kMwzoZ4GZvskFTrDMHU00xueDhpBqH_zufsvF7gisvRrtxrd1mH5NBroVCfqDgJ9VdeA4</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3072530_8_23</pqid></control><display><type>book_chapter</type><title>On the strength of KASUMI without FL functions against Higher Order Differential Attack</title><source>Springer Books</source><creator>Tanaka, Hidema ; Ishii, Chikashi ; Kaneko, Toshinobu</creator><contributor>Won, Dongho</contributor><creatorcontrib>Tanaka, Hidema ; Ishii, Chikashi ; Kaneko, Toshinobu ; Won, Dongho</creatorcontrib><description>The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI without FL functions. As the result, we can attack it using 2nd order differentials. This attack needs about 1,416 chosen plaintexts.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540417826</identifier><identifier>ISBN: 9783540417828</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540452478</identifier><identifier>EISBN: 9783540452478</identifier><identifier>DOI: 10.1007/3-540-45247-8_2</identifier><identifier>OCLC: 213933355</identifier><identifier>LCCallNum: QA268</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Signal and communications theory ; Telecommunications and information theory</subject><ispartof>Information Security and Cryptology - ICISC 2000, 2001, Vol.2015, p.14-21</ispartof><rights>Springer-Verlag Berlin Heidelberg 2001</rights><rights>2001 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3072530-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-45247-8_2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-45247-8_2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=785643$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Won, Dongho</contributor><creatorcontrib>Tanaka, Hidema</creatorcontrib><creatorcontrib>Ishii, Chikashi</creatorcontrib><creatorcontrib>Kaneko, Toshinobu</creatorcontrib><title>On the strength of KASUMI without FL functions against Higher Order Differential Attack</title><title>Information Security and Cryptology - ICISC 2000</title><description>The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI without FL functions. As the result, we can attack it using 2nd order differentials. This attack needs about 1,416 chosen plaintexts.</description><subject>Applied sciences</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Signal and communications theory</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540417826</isbn><isbn>9783540417828</isbn><isbn>3540452478</isbn><isbn>9783540452478</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2001</creationdate><recordtype>book_chapter</recordtype><recordid>eNotUE1PGzEQNS1UBMi5V0s9u_V47PXuMYIGUINyAMTRchw7u026m9qOEP8e52MOM5qZ955mHiHfgf8EzvUvZEpyJpWQmtVGnJErLINDX38hI6gAGKJsvp4WoGtRnZMRRy5YoyV-IyMB2CCiUpdknNJfXgIFNo0akbd5T3PracrR96vc0iHQP5Pn16dH-t7ldthlOp3RsOtd7oY-UbuyXZ8yfehWrY90Hpcl33Uh-MLPnd3QSc7WrW_IRbCb5Menek1ep79fbh_YbH7_eDuZse3-UIbKWYfaAgQr-NJheWchBWheyaZeyCZYr5cViFoBgKz0QjdLD9wHKAjv8Jr8OOpubXJ2E6LtXZfMNnb_bPwwulaVxIJiR1Qqi37lo1kMwzoZ4GZvskFTrDMHU00xueDhpBqH_zufsvF7gisvRrtxrd1mH5NBroVCfqDgJ9VdeA4</recordid><startdate>2001</startdate><enddate>2001</enddate><creator>Tanaka, Hidema</creator><creator>Ishii, Chikashi</creator><creator>Kaneko, Toshinobu</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2001</creationdate><title>On the strength of KASUMI without FL functions against Higher Order Differential Attack</title><author>Tanaka, Hidema ; Ishii, Chikashi ; Kaneko, Toshinobu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p1782-35cac37a11fa20dc3611b421706498b49fae7d61285111467b79de10ef1064ec3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Applied sciences</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Signal and communications theory</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tanaka, Hidema</creatorcontrib><creatorcontrib>Ishii, Chikashi</creatorcontrib><creatorcontrib>Kaneko, Toshinobu</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tanaka, Hidema</au><au>Ishii, Chikashi</au><au>Kaneko, Toshinobu</au><au>Won, Dongho</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>On the strength of KASUMI without FL functions against Higher Order Differential Attack</atitle><btitle>Information Security and Cryptology - ICISC 2000</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2001</date><risdate>2001</risdate><volume>2015</volume><spage>14</spage><epage>21</epage><pages>14-21</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540417826</isbn><isbn>9783540417828</isbn><eisbn>3540452478</eisbn><eisbn>9783540452478</eisbn><abstract>The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI without FL functions. As the result, we can attack it using 2nd order differentials. This attack needs about 1,416 chosen plaintexts.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/3-540-45247-8_2</doi><oclcid>213933355</oclcid><tpages>8</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Information Security and Cryptology - ICISC 2000, 2001, Vol.2015, p.14-21
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_785643
source Springer Books
subjects Applied sciences
Cryptography
Exact sciences and technology
Information, signal and communications theory
Signal and communications theory
Telecommunications and information theory
title On the strength of KASUMI without FL functions against Higher Order Differential Attack
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T16%3A03%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=On%20the%20strength%20of%20KASUMI%20without%20FL%20functions%20against%20Higher%20Order%20Differential%20Attack&rft.btitle=Information%20Security%20and%20Cryptology%20-%20ICISC%202000&rft.au=Tanaka,%20Hidema&rft.date=2001&rft.volume=2015&rft.spage=14&rft.epage=21&rft.pages=14-21&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540417826&rft.isbn_list=9783540417828&rft_id=info:doi/10.1007/3-540-45247-8_2&rft_dat=%3Cproquest_pasca%3EEBC3072530_8_23%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540452478&rft.eisbn_list=9783540452478&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3072530_8_23&rft_id=info:pmid/&rfr_iscdi=true