scispace - formally typeset
Open Access

New observation on camellia

Duo Lei, +2 more
- pp 51-64
Reads0
Chats0
TLDR
In this article, some observations on Camellia are presented, by which the Square attack and the Collision attack are improved and concluded that the most efficient attack on camellia is Square attack.
Abstract
In this paper, some observations on Camellia are presented, by which the Square attack and the Collision attack are improved. 11-round 256-bit Camellia without FL function is breakable with complexity of 2 250 encryptions. 9-round 128-bit Camellia without FL function is breakable with the complexity of 2 90 encryptions. And 10-round 256-bit Camellia with FL function is breakable with the complexity of 2 210 encryptions and 9-round 128-bit Camellia with FL function is breakable with the complexity of 2 122 encryptions. These results are better than any other known results. It concludes that the most efficient attack on Camellia is Square attack.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

The Block Cipher Companion

TL;DR: This book provides a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment and provides an overview of some of the most important cryptanalytic methods.

Cryptanalysis of Block Ciphers

TL;DR: This thesis proposes a new extension of differential cryptanalysis, which is called the impossible boomerang attack, and describes the early abort technique for (related-key) impossible differential crypt analysis and rectangle attacks.
Proceedings ArticleDOI

Compact FPGA implementation of Camellia

TL;DR: This work presents the smallest FPGA implementation of Camellia for 128-bit key length to date using only 318 slices at a throughput of 18.41Mbps on the smallest Xilinx Spartan-3 XC3S50–5 device.
Posted Content

New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256.

TL;DR: This paper proposes several 6-round impossible differentials of Camellia with FL/FL-1 layers in the middle of them, and presents the best cryptanalytic results of camellia-192/-256 with FL /FL/FL/1 layers and CameLLia-256 without FL/Fl- 1 layers to date.
Journal ArticleDOI

SQUARE attack on block ciphers with low algebraic degree

TL;DR: The relations among SQUARE attack and some other cryptanalytic method are studied, showing that if a cipher is breakable by SQUare attack, then it is also breakableBy the interpolation attack.