Skip to main content

The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers

  • Conference paper
Book cover Information Security and Privacy (ACISP 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3108))

Included in the following conference series:

Abstract

This paper presents a dedicated known-plaintext attack on up to four rounds of the IDEA cipher, that trades-off a small number of known data blocks (114) for a larger time complexity (2114). This attack is also applied to up to 2.5-round MESH block ciphers, but are not more effective than previously known attacks. An advantage of this attack compared to previous known-plaintext attacks on IDEA/MESH is that no assumptions on the key value are required. Chosen-plaintext and chosen-plaintext-adaptively-chosen-ciphertext attacks can reach the full 8.5-round IDEA, and up to 5.5-round MESH ciphers, but always under weak-key assumptions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biham, E., Biryukov, A., Shamir, A.: Miss-in-the-Middle Attacks on IDEA, Khufu and Khafre. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 124–138. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  2. Biryukov, A.: Personal communication (2002)

    Google Scholar 

  3. Biryukov, A., Nakahara Jr, J., Preneel, B., Vandewalle, J.: New Weak-Key Classes of IDEA. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 315–326. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Borst, J.: Differential-Linear Cryptanalysis of IDEA. ESAT Dept., COSIC group, Technical Report 96-2 (1996)

    Google Scholar 

  5. Borst, J., Knudsen, L.R., Rijmen, V.: Two Attacks on Reduced IDEA. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 1–13. Springer, Heidelberg (1997)

    Google Scholar 

  6. Daemen, J., Govaerts, R., Vandewalle, J.: Weak Keys for IDEA. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 224–231. Springer, Heidelberg (1994)

    Google Scholar 

  7. Demirci, H.: Square-like Attacks on Reduced Rounds of IDEA. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 147–159. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Demirci, H., Ture, E., Selcuk, A.A.: A New Meet-in-the-Middle Attack on the IDEA block cipher. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Garfinkel, S.: PGP: Pretty Good Privacy. O’Reilly and Associates, Sebastopol (1994)

    Google Scholar 

  10. Hawkes, P.M.: Asymptotic Bounds on Differential Probabilities and an Analysis of the Block Cipher IDEA. The University of Queensland, St. Lucia, Australia (December 1998)

    Google Scholar 

  11. Meier, W.: On the Security of the IDEA Block Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 371–385. Springer, Heidelberg (1994)

    Google Scholar 

  12. Nakahara Jr, J., Barreto, P.S.L.M., Preneel, B., Vandewalle, J., Kim, H.Y.: Square attacks on reduced-round PES and IDEA Block Ciphers. In: Benelux, B.M., Quisquater, J.-J. (eds.) 23rd Symp. on Info. Theory, May 2002, pp. 187–195 (2002)

    Google Scholar 

  13. Nakahara Jr, J., Rijmen, V., Preneel, B., Vandewalle, J.: The MESH Block Ciphers. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 458–473. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Lai, X.: On the Design and Security of Block Ciphers. In: Massey, J.L. (ed.) ETH Series in Information Processing, vol. 1, Hartung-Gorre Verlag, Konstanz (1995)

    Google Scholar 

  15. Lai, X., Massey, J.L.: A Proposal for a New Block Encryption Standard. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 389–404. Springer, Heidelberg (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nakahara, J., Preneel, B., Vandewalle, J. (2004). The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds) Information Security and Privacy. ACISP 2004. Lecture Notes in Computer Science, vol 3108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27800-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-27800-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22379-5

  • Online ISBN: 978-3-540-27800-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics