The Security of RC6 against Asymmetric Chi-square Test Attack

Knudsen and Meier applied the χ2-attack to RC6. The χ2-attack recovers a key by using high correlations measured by χ2-value. The best χ2-attacks to RC6 whose security is guaranteed theoretically works on 16-round RC6 with 192- and 256-bit key but just 8-round RC6 with 128-bit key, because it recove...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information and Media Technologies 2007, Vol.2(4), pp.1052-1061
Hauptverfasser: Hinoue, Tomohiko, Miyaji, Atsuko, Wada, Takatomi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1061
container_issue 4
container_start_page 1052
container_title Information and Media Technologies
container_volume 2
creator Hinoue, Tomohiko
Miyaji, Atsuko
Wada, Takatomi
description Knudsen and Meier applied the χ2-attack to RC6. The χ2-attack recovers a key by using high correlations measured by χ2-value. The best χ2-attacks to RC6 whose security is guaranteed theoretically works on 16-round RC6 with 192- and 256-bit key but just 8-round RC6 with 128-bit key, because it recovers keys of RC6 symmetrically, which requires a time complexity of #plaintexts × 254 and a memory complexity of 280 for recovering one key. In this paper, we improve the χ2-attack to reduce the time complexity. We give the theorem that evaluates the success probability of the χ2-attack on RC6 without using any experimental result. Our key recovery attack recovers keys asymmetrically, which requires a time complexity of #plaintexts × 231 and a memory complexity of 252 for recovering one key. As a result, our key recovery attack works on 16-round RC6 with 192- and 256-bit key and 12-round RC6 with 128-bit key. In the case both of 196- and 256-bit keys, our attack surprisingly reduces the time and memory complexity compared with that of the previous attack. We also demonstrate our theorem on RC6-8/4/8 and make sure of the accuracy by comparing our approximation with the experimental results.
doi_str_mv 10.11185/imt.2.1052
format Article
fullrecord <record><control><sourceid>proquest_jstag</sourceid><recordid>TN_cdi_proquest_miscellaneous_849455230</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3092469131</sourcerecordid><originalsourceid>FETCH-LOGICAL-j2820-734d232adbed47a3da6f6aa04e06a5f8f68f7eaa226a9d93f9c2cd2df709ccff3</originalsourceid><addsrcrecordid>eNpdkEtLAzEQx4MoWGpPfoEFD5625rWb7EGhLL6gIGg9hzGbtFn30SbZQ7-9WysiDgwz8P8xjz9ClwTPCSEyu3FtnNM5wRk9QRMiJUmxLPLTP_05moVQ40MITISYoNvVxiRvRg_exX3S2-S1zBNYg-tCTBZh37YmeqeTcuPSsBvAm2RlDlKMoD8v0JmFJpjZT52i94f7VfmULl8en8vFMq2ppDgVjFeUUag-TMUFsApymwNgbnAOmZU2l1YYAEpzKKqC2UJTXdHKClxobS2bouvj3K3vd8O4X7UuaNM00Jl-CErygmcZZXgkr_6RdT_4bjxOEc7HtwnPxEjdHak6RFgbtfWuBb9X4KPTjVGjk4oq_p0HP38FvQGvTMe-ACVqbqg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1440071457</pqid></control><display><type>article</type><title>The Security of RC6 against Asymmetric Chi-square Test Attack</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>J-STAGE (Japan Science &amp; Technology Information Aggregator, Electronic) Freely Available Titles - Japanese</source><creator>Hinoue, Tomohiko ; Miyaji, Atsuko ; Wada, Takatomi</creator><creatorcontrib>Hinoue, Tomohiko ; Miyaji, Atsuko ; Wada, Takatomi</creatorcontrib><description>Knudsen and Meier applied the χ2-attack to RC6. The χ2-attack recovers a key by using high correlations measured by χ2-value. The best χ2-attacks to RC6 whose security is guaranteed theoretically works on 16-round RC6 with 192- and 256-bit key but just 8-round RC6 with 128-bit key, because it recovers keys of RC6 symmetrically, which requires a time complexity of #plaintexts × 254 and a memory complexity of 280 for recovering one key. In this paper, we improve the χ2-attack to reduce the time complexity. We give the theorem that evaluates the success probability of the χ2-attack on RC6 without using any experimental result. Our key recovery attack recovers keys asymmetrically, which requires a time complexity of #plaintexts × 231 and a memory complexity of 252 for recovering one key. As a result, our key recovery attack works on 16-round RC6 with 192- and 256-bit key and 12-round RC6 with 128-bit key. In the case both of 196- and 256-bit keys, our attack surprisingly reduces the time and memory complexity compared with that of the previous attack. We also demonstrate our theorem on RC6-8/4/8 and make sure of the accuracy by comparing our approximation with the experimental results.</description><identifier>ISSN: 1881-0896</identifier><identifier>EISSN: 1881-0896</identifier><identifier>DOI: 10.11185/imt.2.1052</identifier><language>eng</language><publisher>Tokyo: Information and Media Technologies Editorial Board</publisher><subject>Approximation ; Asymmetry ; Chi-square test ; Complexity ; Computer information security ; Keys ; Recovering ; Recovery ; Theorems</subject><ispartof>Information and Media Technologies, 2007, Vol.2(4), pp.1052-1061</ispartof><rights>2007 by Information Processing Society of Japan</rights><rights>Copyright Japan Science and Technology Agency 2007</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1876,27903,27904</link.rule.ids></links><search><creatorcontrib>Hinoue, Tomohiko</creatorcontrib><creatorcontrib>Miyaji, Atsuko</creatorcontrib><creatorcontrib>Wada, Takatomi</creatorcontrib><title>The Security of RC6 against Asymmetric Chi-square Test Attack</title><title>Information and Media Technologies</title><addtitle>IMT</addtitle><description>Knudsen and Meier applied the χ2-attack to RC6. The χ2-attack recovers a key by using high correlations measured by χ2-value. The best χ2-attacks to RC6 whose security is guaranteed theoretically works on 16-round RC6 with 192- and 256-bit key but just 8-round RC6 with 128-bit key, because it recovers keys of RC6 symmetrically, which requires a time complexity of #plaintexts × 254 and a memory complexity of 280 for recovering one key. In this paper, we improve the χ2-attack to reduce the time complexity. We give the theorem that evaluates the success probability of the χ2-attack on RC6 without using any experimental result. Our key recovery attack recovers keys asymmetrically, which requires a time complexity of #plaintexts × 231 and a memory complexity of 252 for recovering one key. As a result, our key recovery attack works on 16-round RC6 with 192- and 256-bit key and 12-round RC6 with 128-bit key. In the case both of 196- and 256-bit keys, our attack surprisingly reduces the time and memory complexity compared with that of the previous attack. We also demonstrate our theorem on RC6-8/4/8 and make sure of the accuracy by comparing our approximation with the experimental results.</description><subject>Approximation</subject><subject>Asymmetry</subject><subject>Chi-square test</subject><subject>Complexity</subject><subject>Computer information security</subject><subject>Keys</subject><subject>Recovering</subject><subject>Recovery</subject><subject>Theorems</subject><issn>1881-0896</issn><issn>1881-0896</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><recordid>eNpdkEtLAzEQx4MoWGpPfoEFD5625rWb7EGhLL6gIGg9hzGbtFn30SbZQ7-9WysiDgwz8P8xjz9ClwTPCSEyu3FtnNM5wRk9QRMiJUmxLPLTP_05moVQ40MITISYoNvVxiRvRg_exX3S2-S1zBNYg-tCTBZh37YmeqeTcuPSsBvAm2RlDlKMoD8v0JmFJpjZT52i94f7VfmULl8en8vFMq2ppDgVjFeUUag-TMUFsApymwNgbnAOmZU2l1YYAEpzKKqC2UJTXdHKClxobS2bouvj3K3vd8O4X7UuaNM00Jl-CErygmcZZXgkr_6RdT_4bjxOEc7HtwnPxEjdHak6RFgbtfWuBb9X4KPTjVGjk4oq_p0HP38FvQGvTMe-ACVqbqg</recordid><startdate>20070101</startdate><enddate>20070101</enddate><creator>Hinoue, Tomohiko</creator><creator>Miyaji, Atsuko</creator><creator>Wada, Takatomi</creator><general>Information and Media Technologies Editorial Board</general><general>Japan Science and Technology Agency</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20070101</creationdate><title>The Security of RC6 against Asymmetric Chi-square Test Attack</title><author>Hinoue, Tomohiko ; Miyaji, Atsuko ; Wada, Takatomi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j2820-734d232adbed47a3da6f6aa04e06a5f8f68f7eaa226a9d93f9c2cd2df709ccff3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Approximation</topic><topic>Asymmetry</topic><topic>Chi-square test</topic><topic>Complexity</topic><topic>Computer information security</topic><topic>Keys</topic><topic>Recovering</topic><topic>Recovery</topic><topic>Theorems</topic><toplevel>online_resources</toplevel><creatorcontrib>Hinoue, Tomohiko</creatorcontrib><creatorcontrib>Miyaji, Atsuko</creatorcontrib><creatorcontrib>Wada, Takatomi</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information and Media Technologies</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hinoue, Tomohiko</au><au>Miyaji, Atsuko</au><au>Wada, Takatomi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Security of RC6 against Asymmetric Chi-square Test Attack</atitle><jtitle>Information and Media Technologies</jtitle><addtitle>IMT</addtitle><date>2007-01-01</date><risdate>2007</risdate><volume>2</volume><issue>4</issue><spage>1052</spage><epage>1061</epage><pages>1052-1061</pages><issn>1881-0896</issn><eissn>1881-0896</eissn><abstract>Knudsen and Meier applied the χ2-attack to RC6. The χ2-attack recovers a key by using high correlations measured by χ2-value. The best χ2-attacks to RC6 whose security is guaranteed theoretically works on 16-round RC6 with 192- and 256-bit key but just 8-round RC6 with 128-bit key, because it recovers keys of RC6 symmetrically, which requires a time complexity of #plaintexts × 254 and a memory complexity of 280 for recovering one key. In this paper, we improve the χ2-attack to reduce the time complexity. We give the theorem that evaluates the success probability of the χ2-attack on RC6 without using any experimental result. Our key recovery attack recovers keys asymmetrically, which requires a time complexity of #plaintexts × 231 and a memory complexity of 252 for recovering one key. As a result, our key recovery attack works on 16-round RC6 with 192- and 256-bit key and 12-round RC6 with 128-bit key. In the case both of 196- and 256-bit keys, our attack surprisingly reduces the time and memory complexity compared with that of the previous attack. We also demonstrate our theorem on RC6-8/4/8 and make sure of the accuracy by comparing our approximation with the experimental results.</abstract><cop>Tokyo</cop><pub>Information and Media Technologies Editorial Board</pub><doi>10.11185/imt.2.1052</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1881-0896
ispartof Information and Media Technologies, 2007, Vol.2(4), pp.1052-1061
issn 1881-0896
1881-0896
language eng
recordid cdi_proquest_miscellaneous_849455230
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; J-STAGE (Japan Science & Technology Information Aggregator, Electronic) Freely Available Titles - Japanese
subjects Approximation
Asymmetry
Chi-square test
Complexity
Computer information security
Keys
Recovering
Recovery
Theorems
title The Security of RC6 against Asymmetric Chi-square Test Attack
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T08%3A48%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_jstag&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Security%20of%20RC6%20against%20Asymmetric%20Chi-square%20Test%20Attack&rft.jtitle=Information%20and%20Media%20Technologies&rft.au=Hinoue,%20Tomohiko&rft.date=2007-01-01&rft.volume=2&rft.issue=4&rft.spage=1052&rft.epage=1061&rft.pages=1052-1061&rft.issn=1881-0896&rft.eissn=1881-0896&rft_id=info:doi/10.11185/imt.2.1052&rft_dat=%3Cproquest_jstag%3E3092469131%3C/proquest_jstag%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1440071457&rft_id=info:pmid/&rfr_iscdi=true