Presentation | 1999/7/22 Differential Attack on CRYPTON Haruki SEKI, Toshinobu KANEKO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | An block cipher CRYPTON based on the structure of SQUARE is a candidate algorithm for the AES. Recently Lim changes the S-box construction and key scheduling, and suggested modified version (version 1.0). In this paper we present an attack on CRYPTON reduced to 5 rounds. This attack is based on impossible differentials. 4 rounds of CRYPTON has impossible differential, we use this to show that CRYPTON version 1.0 reduced to 5 rounds can be attacked using 2^<83.4> chosen plaintext and ciphertext pairs. This attack can be also applied to CRYPTON version 0.5 using less chosen plaintext and ciphertext pairs. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Block cipher / CRYPTON / Impossible differential attack |
Paper # | ISEC99-22 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1999/7/22(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Differential Attack on CRYPTON |
Sub Title (in English) | |
Keyword(1) | Block cipher |
Keyword(2) | CRYPTON |
Keyword(3) | Impossible differential attack |
1st Author's Name | Haruki SEKI |
1st Author's Affiliation | Telecommunications Advancement Organization of Japan() |
2nd Author's Name | Toshinobu KANEKO |
2nd Author's Affiliation | Department of Electrical Engineering, Science University of TOKYO |
Date | 1999/7/22 |
Paper # | ISEC99-22 |
Volume (vol) | vol.99 |
Number (no) | 208 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |