Presentation | 2000/9/22 The Security Evaluation of Block Cipher Twofish Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We propose a new method for evaluating the security of block ciphers like Twofish against truncated differential cryptanalysis. To this end, we propose the new methods for evaluating the truncated differential probability of key-addition and Pseudo Hadamard Transforms (PHT). Using these methods and previously proposed evaluation method for SPN-structures, we can evaluate the truncated differential probability of Twofish. This evaluation indicates that 5-rounds of Twofish (including 1 additional round) can be cryptanalyzed by truncated differential cryptanalysis, and 6-rounds (including 1 additional round) do not. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | truncated differential cryptanalysis / MDS transform / PHT / key addition |
Paper # | ISEC2000-74 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2000/9/22(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | The Security Evaluation of Block Cipher Twofish |
Sub Title (in English) | |
Keyword(1) | truncated differential cryptanalysis |
Keyword(2) | MDS transform |
Keyword(3) | PHT |
Keyword(4) | key addition |
1st Author's Name | Makoto Sugita |
1st Author's Affiliation | NTT Wireless Systems Innovation Laboratory, Network Innovation Laboratories() |
2nd Author's Name | Kazukuni Kobara |
2nd Author's Affiliation | Institute of Industrial Sciences, The University of Tokyo |
3rd Author's Name | Kazuhiro Uehara |
3rd Author's Affiliation | NTT Wireless Systems Innovation Laboratory, Network Innovation Laboratories |
4th Author's Name | Shuji Kubota |
4th Author's Affiliation | NTT Wireless Systems Innovation Laboratory, Network Innovation Laboratories |
5th Author's Name | Hideki Imai |
5th Author's Affiliation | Institute of Industrial Sciences, The University of Tokyo |
Date | 2000/9/22 |
Paper # | ISEC2000-74 |
Volume (vol) | vol.100 |
Number (no) | 324 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |