Improved automatic search of impossible differentials for camellia with FL/FL −1 layers

  • Yaoling Ding
  • Xiaoyun Wang
  • Ning Wang
  • Wei Wang



This work was supported by National Basic Research Program of China (973 Program) (Grant No. 2013CB834205), National Natural Science Foundation of China (Grant No. 61402256) and Zhejiang Province Key R & D Project (Grant No. 2017C01062).


  1. 1.
    Wu S, Wang M. Automatic search of truncated impossible differentials for word-oriented block ciphers. In: Proceedings of International Conference on Cryptology in India, Kolkata, 2012. 283–302MATHGoogle Scholar
  2. 2.
    Chen J. Cryptanalysis of several block ciphers. Dissertation for Ph.D. Degree. Jinan: Shandong Univercity, 2012Google Scholar
  3. 3.
    Liu Y, Li L, Gu D, et al. New observations on impossible differential cryptanalysis of reduced-round Camellia. In: Proceedings of the 19th International Conference on Fast Software Encryption, Washington, 2012. 90–109MATHGoogle Scholar
  4. 4.
    Bai D, Li L. New impossible differential attacks on camellia. In: Proceedings of International Conference on Information Security Practice and Experience, Hangzhou, 2012. 80–96MATHGoogle Scholar
  5. 5.
    Blondeau C. Impossible differential attack on 13-round Camellia-192. Inf Process Lett, 2015, 115: 660–666MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Boura C, Naya-Plasencia M, Suder V. Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and Simon. In: Advances in Cryptology — ASIACRYPT. Berlin: Springer, 2014. 8873: 179–199MATHGoogle Scholar
  7. 7.
    Aoki K, Ichikawa T, Kanda M, et al. Camellia: a 128-bit block cipher suitable for multiple platforms design and analysis. In: Proceedings of International Workshop on Selected Areas in Cryptography, Ontario, 2000. 39–56MATHGoogle Scholar
  8. 8.
    Li L, Jia K, Wang X, et al. Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia. In: Proceedings of International Workshop on Fast Software Encryption, Istanbul, 2015. 48–70MATHGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  • Yaoling Ding
    • 1
  • Xiaoyun Wang
    • 2
    • 3
    • 4
  • Ning Wang
    • 3
    • 4
  • Wei Wang
    • 3
    • 5
  1. 1.Department of Computer Science and TechnologyTsinghua UniversityBeijingChina
  2. 2.Institute for Advanced StudyTsinghua UniversityBeijingChina
  3. 3.Key Laboratory of Cryptologic Technology and Information Security, Ministry of EducationShandong UniversityJinanChina
  4. 4.School of MathematicsShandong UniversityJinanChina
  5. 5.School of Computer Science and TechnologyShandong UniversityJinanChina

Personalised recommendations