Abstract
CLEFIA, a new 128-bit block cipher proposed by Sony Corporation, is increasingly attracting cryptanalysts’ attention. In this paper, we present two new impossible differential attacks on 13 rounds of CLEFIA-128. The proposed attacks utilize a variety of previously known techniques, in particular the hash table technique and redundancy in the key schedule of this block cipher. The first attack does not consider the whitening layers of CLEFIA, requires 2109.5 chosen plaintexts, and has a running time equivalent to about 2112.9 encryptions. The second attack preserves the whitening layers, requires 2117.8 chosen plaintexts, and has a total time complexity equivalent to about 2121.2 encryptions.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Further Reading
Shirai T, Shibutani K. On feistel structures using a diffusion switching mechanism. In Proc. FSE 2006, Graz, Austria, Mar. 15–17, 2006, pp.41–56.
Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T. The 128-bit block cipher CLEFIA (extended abstract). In Proc. FSE 2007, Luxembourg, Mar. 26–28, 2007, pp.181–195.
The 128 bit block cipher CLEFIA algorithm specification. Sony Corporation, http://www.sony.net/Products/cryptography/clefia
Lee C, Kim J, Sung J, Hong S, Lee S. Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis. In Proc. ICCSA 2006, Glasgow, UK, May 8–11, 2006, pp.446–455.
Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991, 4(1): 3–72.
Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In Proc. EUROCRYPT 1999, Prague, Czech, May 2–6, 1999, pp.12–23.
The 128-bit block cipher CLEFIA security and performance evaluations. Sony Corporation, http://www.sony.net/Products/cryptography/clefia/technical/data/clefia-eval-1.0.pdf, Jun. 1, 2007.
Tsunoo Y, Tsujihara E, Shigeri M, Saito T, Suzaki T, Kubo H. Impossible differential cryptanalysis of CLEFIA. In Proc. FSE 2008, Lausanne, Switzerland, Feb. 10–13, 2008, pp.398–411.
Wang W, Wang X. Improved impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report 2007/466, http://eprint.iacr.org/.
Sun B, Ruilin L, Wang M, Li P, Li C. Impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report 2008/151, http://eprint.iacr.org/.
Tsujihara E, Shigeri M, Suzaki T, Kawabata T, Tsunoo Y. New impossible differentials of CLEFIA. IEICE Technical Report, ISEC2008–3 (2008–05), pp.15–22. (In Japanese)
Zhang W, Han J. Impossible differential analysis of reduced round CLEFIA. In Proc. Inscrypt 2008, Beijing, China, Dec. 14–17, 2008, pp.181–191.
Comments on the impossible differential analysis of reduced round CLEFIA presented at Inscrypt 2008. CLEFIA Design Team, Sony Corporation, Jan. 8, 2009.
The 128-bit block cipher CLEFIA design rationale. Sony Corporation, http://www.sony.net/Products/cryptography/clefia/technical/data/clefia-design-1.0.pdf, Jun. 1, 2007.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mala, H., Dakhilalian, M. & Shakiba, M. Impossible Differential Attacks on 13-Round CLEFIA-128. J. Comput. Sci. Technol. 26, 744–750 (2011). https://doi.org/10.1007/s11390-011-1173-0
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-011-1173-0