Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 352-356.

Previous Articles     Next Articles

Impossible Differential Cryptanalysis of CLEFIA

YIN Guang-li and WEI Hong-ru   

  • Online:2018-11-14 Published:2018-11-14

Abstract: To analyze impossible differential cryptanalysis on the block cipher CLEFIA,the results are presented based on two 9-round impossible differential role.It uses the output and input differences of S-boxes to recover round keys,which apply one impossible differential attack to 11-round reduced CLEFIA.Improved result on 14round CLEFFIA-256is given with the number of chosen plaintexts being reduced to 2104.23and the time complexity reduced to 2221.5.At the same time,exploiting the key relations,using Early -Abort technique and S-boxes differential technique,impossible differential attack is proposed on 12and 13-round CLEFIA-128based on two impossible differential roles respectively.

Key words: Block cipher,CLEFIA,Impossible differential attack,S-box,Early-abort technique

[1] Biham E,Biryukov A,Shamir A.Cryptanalysis of Skipjackreduced to 31rounds using impossible differentials[C]∥ Jacques Stern.Advances in ryptology-Eurocrypt’99.Czech Republic:Springer Berlin Heidelberg,1999:12-23
[2] Sony Corporation.The 128-bit Block cipher CLEFIA:Security and Performance Evaluations,Revision 1.0[R].Tokyo:Sony Corporation,2007
[3] Shirai T,Shibutani K,Akishita T,et al.The 128-bit block cipher CLEFIA[C]∥Alex Biryukov.FSE 2007,LNCS 4593,Luxembourg:Springer Berlin Heidelberg,2007:181-195
[4] 王薇.分组密码CLEFIA与基于四圈AES的消息认证码的安全性分析[D].济南:山东大学,2009
[5] Tsunoo Y,Tsujihara E,Shigeri M,et al.Impossible differential Cryptanalysis of CLEFA[C]∥Kaisa Nyberg.FSE 2008,LNCS 5086.Lausanne,Switzerland:Springer Berlin Heidelberg,2008:398-411
[6] 孙兵.分组密码的分析方法及应用研究[D].长沙:国防科学技术大学,2009
[7] Tang X,Sun B,Li R,et al.Impossible differential cryptanalysis of 13-round CLEFIA-128[J].Journal of Systems and Software,2011,84(7):1191-1196
[8] Mala H,Dakhilalian M,Shakiba M.Impossible differential attacks on 13-round CLEFIA-128[J].Journal of Computer Science and Technology,2011,26(4):744-750
[9] 吴文玲,张文涛.分组密码的设计与分析[M].北京:清华大学出版社,2009:68-72
[10] 刘青,卫宏儒.对完整轮数ARIRANG加密模式的新的相关密钥矩形攻击[J].计算机科学,2013,40(8):109-114

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!