On the strength of KASUMI without FL functions against Higher Order Differential Attack
The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 21 |
---|---|
container_issue | |
container_start_page | 14 |
container_title | |
container_volume | 2015 |
creator | Tanaka, Hidema Ishii, Chikashi Kaneko, Toshinobu |
description | The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI without FL functions. As the result, we can attack it using 2nd order differentials. This attack needs about 1,416 chosen plaintexts. |
doi_str_mv | 10.1007/3-540-45247-8_2 |
format | Book Chapter |
fullrecord | <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_785643</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3072530_8_23</sourcerecordid><originalsourceid>FETCH-LOGICAL-p1782-35cac37a11fa20dc3611b421706498b49fae7d61285111467b79de10ef1064ec3</originalsourceid><addsrcrecordid>eNotUE1PGzEQNS1UBMi5V0s9u_V47PXuMYIGUINyAMTRchw7u026m9qOEP8e52MOM5qZ955mHiHfgf8EzvUvZEpyJpWQmtVGnJErLINDX38hI6gAGKJsvp4WoGtRnZMRRy5YoyV-IyMB2CCiUpdknNJfXgIFNo0akbd5T3PracrR96vc0iHQP5Pn16dH-t7ldthlOp3RsOtd7oY-UbuyXZ8yfehWrY90Hpcl33Uh-MLPnd3QSc7WrW_IRbCb5Menek1ep79fbh_YbH7_eDuZse3-UIbKWYfaAgQr-NJheWchBWheyaZeyCZYr5cViFoBgKz0QjdLD9wHKAjv8Jr8OOpubXJ2E6LtXZfMNnb_bPwwulaVxIJiR1Qqi37lo1kMwzoZ4GZvskFTrDMHU00xueDhpBqH_zufsvF7gisvRrtxrd1mH5NBroVCfqDgJ9VdeA4</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3072530_8_23</pqid></control><display><type>book_chapter</type><title>On the strength of KASUMI without FL functions against Higher Order Differential Attack</title><source>Springer Books</source><creator>Tanaka, Hidema ; Ishii, Chikashi ; Kaneko, Toshinobu</creator><contributor>Won, Dongho</contributor><creatorcontrib>Tanaka, Hidema ; Ishii, Chikashi ; Kaneko, Toshinobu ; Won, Dongho</creatorcontrib><description>The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI without FL functions. As the result, we can attack it using 2nd order differentials. This attack needs about 1,416 chosen plaintexts.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540417826</identifier><identifier>ISBN: 9783540417828</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540452478</identifier><identifier>EISBN: 9783540452478</identifier><identifier>DOI: 10.1007/3-540-45247-8_2</identifier><identifier>OCLC: 213933355</identifier><identifier>LCCallNum: QA268</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Signal and communications theory ; Telecommunications and information theory</subject><ispartof>Information Security and Cryptology - ICISC 2000, 2001, Vol.2015, p.14-21</ispartof><rights>Springer-Verlag Berlin Heidelberg 2001</rights><rights>2001 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3072530-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-45247-8_2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-45247-8_2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=785643$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Won, Dongho</contributor><creatorcontrib>Tanaka, Hidema</creatorcontrib><creatorcontrib>Ishii, Chikashi</creatorcontrib><creatorcontrib>Kaneko, Toshinobu</creatorcontrib><title>On the strength of KASUMI without FL functions against Higher Order Differential Attack</title><title>Information Security and Cryptology - ICISC 2000</title><description>The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI without FL functions. As the result, we can attack it using 2nd order differentials. This attack needs about 1,416 chosen plaintexts.</description><subject>Applied sciences</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Signal and communications theory</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540417826</isbn><isbn>9783540417828</isbn><isbn>3540452478</isbn><isbn>9783540452478</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2001</creationdate><recordtype>book_chapter</recordtype><recordid>eNotUE1PGzEQNS1UBMi5V0s9u_V47PXuMYIGUINyAMTRchw7u026m9qOEP8e52MOM5qZ955mHiHfgf8EzvUvZEpyJpWQmtVGnJErLINDX38hI6gAGKJsvp4WoGtRnZMRRy5YoyV-IyMB2CCiUpdknNJfXgIFNo0akbd5T3PracrR96vc0iHQP5Pn16dH-t7ldthlOp3RsOtd7oY-UbuyXZ8yfehWrY90Hpcl33Uh-MLPnd3QSc7WrW_IRbCb5Menek1ep79fbh_YbH7_eDuZse3-UIbKWYfaAgQr-NJheWchBWheyaZeyCZYr5cViFoBgKz0QjdLD9wHKAjv8Jr8OOpubXJ2E6LtXZfMNnb_bPwwulaVxIJiR1Qqi37lo1kMwzoZ4GZvskFTrDMHU00xueDhpBqH_zufsvF7gisvRrtxrd1mH5NBroVCfqDgJ9VdeA4</recordid><startdate>2001</startdate><enddate>2001</enddate><creator>Tanaka, Hidema</creator><creator>Ishii, Chikashi</creator><creator>Kaneko, Toshinobu</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2001</creationdate><title>On the strength of KASUMI without FL functions against Higher Order Differential Attack</title><author>Tanaka, Hidema ; Ishii, Chikashi ; Kaneko, Toshinobu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p1782-35cac37a11fa20dc3611b421706498b49fae7d61285111467b79de10ef1064ec3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Applied sciences</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Signal and communications theory</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tanaka, Hidema</creatorcontrib><creatorcontrib>Ishii, Chikashi</creatorcontrib><creatorcontrib>Kaneko, Toshinobu</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tanaka, Hidema</au><au>Ishii, Chikashi</au><au>Kaneko, Toshinobu</au><au>Won, Dongho</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>On the strength of KASUMI without FL functions against Higher Order Differential Attack</atitle><btitle>Information Security and Cryptology - ICISC 2000</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2001</date><risdate>2001</risdate><volume>2015</volume><spage>14</spage><epage>21</epage><pages>14-21</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540417826</isbn><isbn>9783540417828</isbn><eisbn>3540452478</eisbn><eisbn>9783540452478</eisbn><abstract>The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI without FL functions. As the result, we can attack it using 2nd order differentials. This attack needs about 1,416 chosen plaintexts.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/3-540-45247-8_2</doi><oclcid>213933355</oclcid><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Information Security and Cryptology - ICISC 2000, 2001, Vol.2015, p.14-21 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_785643 |
source | Springer Books |
subjects | Applied sciences Cryptography Exact sciences and technology Information, signal and communications theory Signal and communications theory Telecommunications and information theory |
title | On the strength of KASUMI without FL functions against Higher Order Differential Attack |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T16%3A03%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=On%20the%20strength%20of%20KASUMI%20without%20FL%20functions%20against%20Higher%20Order%20Differential%20Attack&rft.btitle=Information%20Security%20and%20Cryptology%20-%20ICISC%202000&rft.au=Tanaka,%20Hidema&rft.date=2001&rft.volume=2015&rft.spage=14&rft.epage=21&rft.pages=14-21&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540417826&rft.isbn_list=9783540417828&rft_id=info:doi/10.1007/3-540-45247-8_2&rft_dat=%3Cproquest_pasca%3EEBC3072530_8_23%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540452478&rft.eisbn_list=9783540452478&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3072530_8_23&rft_id=info:pmid/&rfr_iscdi=true |