Presentation 2000/9/22
The Security Evaluation of Block Cipher Twofish
Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We propose a new method for evaluating the security of block ciphers like Twofish against truncated differential cryptanalysis. To this end, we propose the new methods for evaluating the truncated differential probability of key-addition and Pseudo Hadamard Transforms (PHT). Using these methods and previously proposed evaluation method for SPN-structures, we can evaluate the truncated differential probability of Twofish. This evaluation indicates that 5-rounds of Twofish (including 1 additional round) can be cryptanalyzed by truncated differential cryptanalysis, and 6-rounds (including 1 additional round) do not.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) truncated differential cryptanalysis / MDS transform / PHT / key addition
Paper # ISEC2000-74
Date of Issue

Conference Information
Committee ISEC
Conference Date 2000/9/22(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) The Security Evaluation of Block Cipher Twofish
Sub Title (in English)
Keyword(1) truncated differential cryptanalysis
Keyword(2) MDS transform
Keyword(3) PHT
Keyword(4) key addition
1st Author's Name Makoto Sugita
1st Author's Affiliation NTT Wireless Systems Innovation Laboratory, Network Innovation Laboratories()
2nd Author's Name Kazukuni Kobara
2nd Author's Affiliation Institute of Industrial Sciences, The University of Tokyo
3rd Author's Name Kazuhiro Uehara
3rd Author's Affiliation NTT Wireless Systems Innovation Laboratory, Network Innovation Laboratories
4th Author's Name Shuji Kubota
4th Author's Affiliation NTT Wireless Systems Innovation Laboratory, Network Innovation Laboratories
5th Author's Name Hideki Imai
5th Author's Affiliation Institute of Industrial Sciences, The University of Tokyo
Date 2000/9/22
Paper # ISEC2000-74
Volume (vol) vol.100
Number (no) 324
Page pp.pp.-
#Pages 8
Date of Issue