Improved automatic search of impossible differentials for camellia with FL/FL −1 layers

  • Yaoling Ding
  • Xiaoyun Wang
  • Ning Wang
  • Wei Wang



This work was supported by National Basic Research Program of China (973 Program) (Grant No. 2013CB834205), National Natural Science Foundation of China (Grant No. 61402256) and Zhejiang Province Key R & D Project (Grant No. 2017C01062).


  1. 1.
    Wu S, Wang M. Automatic search of truncated impossible differentials for word-oriented block ciphers. In: Proceedings of International Conference on Cryptology in India, Kolkata, 2012. 283–302zbMATHGoogle Scholar
  2. 2.
    Chen J. Cryptanalysis of several block ciphers. Dissertation for Ph.D. Degree. Jinan: Shandong Univercity, 2012Google Scholar
  3. 3.
    Liu Y, Li L, Gu D, et al. New observations on impossible differential cryptanalysis of reduced-round Camellia. In: Proceedings of the 19th International Conference on Fast Software Encryption, Washington, 2012. 90–109zbMATHGoogle Scholar
  4. 4.
    Bai D, Li L. New impossible differential attacks on camellia. In: Proceedings of International Conference on Information Security Practice and Experience, Hangzhou, 2012. 80–96zbMATHGoogle Scholar
  5. 5.
    Blondeau C. Impossible differential attack on 13-round Camellia-192. Inf Process Lett, 2015, 115: 660–666MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Boura C, Naya-Plasencia M, Suder V. Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and Simon. In: Advances in Cryptology — ASIACRYPT. Berlin: Springer, 2014. 8873: 179–199zbMATHGoogle Scholar
  7. 7.
    Aoki K, Ichikawa T, Kanda M, et al. Camellia: a 128-bit block cipher suitable for multiple platforms design and analysis. In: Proceedings of International Workshop on Selected Areas in Cryptography, Ontario, 2000. 39–56zbMATHGoogle Scholar
  8. 8.
    Li L, Jia K, Wang X, et al. Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia. In: Proceedings of International Workshop on Fast Software Encryption, Istanbul, 2015. 48–70zbMATHGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  • Yaoling Ding
    • 1
  • Xiaoyun Wang
    • 2
    • 3
    • 4
  • Ning Wang
    • 3
    • 4
  • Wei Wang
    • 3
    • 5
  1. 1.Department of Computer Science and TechnologyTsinghua UniversityBeijingChina
  2. 2.Institute for Advanced StudyTsinghua UniversityBeijingChina
  3. 3.Key Laboratory of Cryptologic Technology and Information Security, Ministry of EducationShandong UniversityJinanChina
  4. 4.School of MathematicsShandong UniversityJinanChina
  5. 5.School of Computer Science and TechnologyShandong UniversityJinanChina

Personalised recommendations