Open Access
New observation on camellia
Duo Lei,Li Chao,Keqin Feng +2 more
- pp 51-64
Reads0
Chats0
TLDR
In this article, some observations on Camellia are presented, by which the Square attack and the Collision attack are improved and concluded that the most efficient attack on camellia is Square attack.Abstract:
In this paper, some observations on Camellia are presented, by which the Square attack and the Collision attack are improved. 11-round 256-bit Camellia without FL function is breakable with complexity of 2 250 encryptions. 9-round 128-bit Camellia without FL function is breakable with the complexity of 2 90 encryptions. And 10-round 256-bit Camellia with FL function is breakable with the complexity of 2 210 encryptions and 9-round 128-bit Camellia with FL function is breakable with the complexity of 2 122 encryptions. These results are better than any other known results. It concludes that the most efficient attack on Camellia is Square attack.read more
Citations
More filters
Book
The Block Cipher Companion
Lars R. Knudsen,Matthew Robshaw +1 more
TL;DR: This book provides a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment and provides an overview of some of the most important cryptanalytic methods.
Cryptanalysis of Block Ciphers
TL;DR: This thesis proposes a new extension of differential cryptanalysis, which is called the impossible boomerang attack, and describes the early abort technique for (related-key) impossible differential crypt analysis and rectangle attacks.
Proceedings ArticleDOI
Compact FPGA implementation of Camellia
Panasayya Yalla,Jens-Peter Kaps +1 more
TL;DR: This work presents the smallest FPGA implementation of Camellia for 128-bit key length to date using only 318 slices at a throughput of 18.41Mbps on the smallest Xilinx Spartan-3 XC3S50–5 device.
Posted Content
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256.
TL;DR: This paper proposes several 6-round impossible differentials of Camellia with FL/FL-1 layers in the middle of them, and presents the best cryptanalytic results of camellia-192/-256 with FL /FL/FL/1 layers and CameLLia-256 without FL/Fl- 1 layers to date.
Journal ArticleDOI
SQUARE attack on block ciphers with low algebraic degree
TL;DR: The relations among SQUARE attack and some other cryptanalytic method are studied, showing that if a cipher is breakable by SQUare attack, then it is also breakableBy the interpolation attack.