computational cost. We confirmed them by the computer simulation. It took about 0.5[s] on a WS." />
Presentation | 1998/12/12 Higher Order Diferential Attack of MISTY1 without FL functions Hidema TANAKA, Kazuyuki HISAMATSU, Toshinobu KANEKO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The encyption algorithm MISTY, proposed by Matsui in 1996, is a "probably secure" one against Linear and Differential cryptanalysis. We analyzed MISTY1 without FL functions by Higher Order Differential Attack. This is a chosen plain text attack which uses the fact that the value of higher order differential of the output does not depend on the keys. The necessaryorder for the attack depends on the chosen plain texts and it affects the number of texts and the computational cost. We found the effective chosen plain text which enables the attack to 5 round MISTY1 without FL functions. The attack is ; (Step-1) Using 7th order differential, to determine 4 sub-keys. (Step-2) By the determined keys and 6th order differential, to determine 8 sub-keys. The most time consuring part is Step-1. We estimated that Step-1 needs 1, 408 chosen plain texts and 2^<17> computational cost. We confirmed them by the computer simulation. It took about 0.5[s] on a WS. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Block Cipher / MISTY / Chosen Plain Text Attack / Higher Order Differential |
Paper # | ISEC98-66 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1998/12/12(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Higher Order Diferential Attack of MISTY1 without FL functions |
Sub Title (in English) | |
Keyword(1) | Block Cipher |
Keyword(2) | MISTY |
Keyword(3) | Chosen Plain Text Attack |
Keyword(4) | Higher Order Differential |
1st Author's Name | Hidema TANAKA |
1st Author's Affiliation | Kaneko Laboratory, Department of Electrical Engineering, Science University of Tokyo() |
2nd Author's Name | Kazuyuki HISAMATSU |
2nd Author's Affiliation | Kaneko Laboratory, Department of Electrical Engineering, Science University of Tokyo |
3rd Author's Name | Toshinobu KANEKO |
3rd Author's Affiliation | Kaneko Laboratory, Department of Electrical Engineering, Science University of Tokyo |
Date | 1998/12/12 |
Paper # | ISEC98-66 |
Volume (vol) | vol.98 |
Number (no) | 466 |
Page | pp.pp.- |
#Pages | 7 |
Date of Issue |