Skip to main content

Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Included in the following conference series:

Abstract

We examine the security of block ciphers on the view point of pseudorandomness. Firstly we show that the four round (unbalanced) MISTY-type and the three round dual MISTY-type transformations are pseudorandom permutation ensembles. Secondly we prove that the three round KASUMI is not a pseudorandom permutation ensemble but the four round KASUMI is a pseudorandom permutation ensemble. We provide simplified probability-theoretic proofs for non-adaptive distinguishers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ETSI/SAGE, Specification of the 3GPP Confidentiality and Integrity Algorithms, available at http://www.etsi.org/dvbandca/3GPP/3gppspecs.htm

  2. H. Gilbert and M. Minier, New results on the pseudorandomness of some block cipher constructions, Preproceedings of Fast Software Encryption workshop 2001, (2001, Yokohama), pp. 260–277.

    Google Scholar 

  3. T. Iwata and K. Kurosawa, On the pseudorandomness of the AES finalists-RC6 and Serpent, Preproceedings of Fast Software Encryption workshop 2000, (2000, New York).

    Google Scholar 

  4. T. Iwata, T. Yoshino, T. Yuasa, and K. Kurosawa, Round security and superpseudorandomness of MISTY type structure, Preproceedings of Fast Software Encryption workshop 2001, (2001, Yokohama), pp. 245–259.

    Google Scholar 

  5. M. Luby and C. Rackoff, How to construct pseudorandom permutations and pseudorandom functions, SIAM J. Comput., Vol. 17, 1988, pp. 189–203.

    Article  MathSciNet  Google Scholar 

  6. M. Matsui, New permutation of Block Ciphers with Provable Security against Differential and Linear Cryptalaysis, Fast Software Encryption, LNCS 1039, Springer-Verlag, 1996, pp. 205–218.

    Google Scholar 

  7. M. Matsui, New Block Encryption Algorithm MISTY, Fast Software Encryption’97, LNCS 1267, Springer-Verlag, 1997, pp. 54–68.

    Chapter  Google Scholar 

  8. U. M. Maurer, A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators, Advances in Cryptology-Eurocrypt’92, LNCS 658, Springer-Verlag, 1992, pp. 239–255.

    Google Scholar 

  9. M. Naor and O. Reingold, On the construction of pseudorandom permutations: Luby-Rackoff revisited, J. Cryptology, Vol. 12, 1999, pp. 29–66.

    Article  MATH  MathSciNet  Google Scholar 

  10. K. Sakurai and Y. Zheng, On non-pseudorandomness from block ciphers with provable immunity against linear cryptanaysis, IEICE Trans. Fundamentals, Vol. E80-A, No. 1, 1997, pp. 19–24.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, JS., Yi, O., Hong, D., Cho, H. (2001). Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_7

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics