Slide Attack on Spectr-H64

  • Selçuk Kavut
  • Melek D. Yücel
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2551)

Abstract

We compare one round diffusion characteristics of the block cipher Spectr-H64 to those of AES-Rijndael and Safer K-64, in terms of the Avalanche Weight Distribution (AWD) criterion and observe a weakness in the round transformation of Spectr-H64. We exploit this weakness to break one round of Spectr-H64 extracting half of the key bits, and develop a chosen plaintext slide attack against the overall encryption algorithm, which works for 232 elements of the key space (out of 2256). We also observe 2128 weak keys, for which encryption becomes the same function as decryption, and 232 fixed points for each weak key.

Keywords

Slide attack Spectr-H64 Avalanche Weight Distribution (AWD) 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    N. D. Goots, A. A. Moldovyan, and N. A. Moldovyan, Fast Encryption Algorithm Spectr-H64. In: V. I. Gorodetski, V. A. Skormin, L. J. Popyack (Eds.), Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security. Lecture Notes in Computer Science, Vol. 2052, pp. 275–286, Springer-Verlag, 2001.Google Scholar
  2. [2]
    Biryukov and D. Wagner, Slide Attacks. In: L. R. Knudsen (Ed.), Fast Software Encryption-FSE’99. Lecture Notes in Computer Science, Vol. 1636, pp. 245–259, Springer-Verlag, 1999.CrossRefGoogle Scholar
  3. [3]
    Biryukov and D. Wagner, Advanced Slide Attacks. In: B. Preneel (Ed.), Advances in Cryptology-EUROCRYPT’2000. Lecture Notes in Computer Science, Vol. 1807, pp. 589–606, Springer-Verlag, 2000.CrossRefGoogle Scholar
  4. [4]
    S. Murphy, The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts. Journal of Cryptography, Vol.2, No.3, pp.145–154, 1990.MATHMathSciNetGoogle Scholar
  5. [5]
    Shamir and E. Biham, Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol.4, No.1, pp.3–72, 1991.MATHCrossRefMathSciNetGoogle Scholar
  6. [6]
    J. Daemen and V. Rijmen, The Design of Rijndael, AES-The Advanced Encryption Standard. Springer-Verlag, 2002.Google Scholar
  7. [7]
    J. L. Massey, Safer K-64: A Byte Oriented Block-Ciphering Algorithm. In: R. J. Anderson, Fast Software Encryption-FSE’93. Lecture Notes in Computer Science, Vol. 809, pp.1–17, Springer-Verlag, 1994.Google Scholar
  8. [8]
    S. Kavut, and M. D. Yücel, On Some Cryptographic Properties of Rijndael. In: V. I. Gorodetski, V. A. Skormin, L. J. Popyack (Eds.): Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security. Lecture Notes in Computer Science, Vol. 2052, pp. 300–311, Springer-Verlag, 2001.Google Scholar
  9. [9]
    E. Aras and M. D. Yücel, Performance Evaluation of Safer K-64 and S-Boxes of Safer Family. Turkish Journal of Electrical Engineering & Computer Sciences, Vol.9, No.2, pp. 161–175, 2001.Google Scholar
  10. [10]
    E. K. Grossman and B. Tuckerman, Analysis of a Weakened Feistel-like Cipher. Proc. International Conference on Communications, pp.46.3.1–46.3.5, Alger Press, 1978.Google Scholar
  11. [11]
    E. Biham, New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology, Vol.7, pp.229–246, 1994.MATHCrossRefGoogle Scholar
  12. [12]
    L. R. Knudsen, Cryptanalysis of LOKI91. In: J. Seberry and Y. Zheng (Eds.): Advances in Cryptology-ASIACRYPT’92. Lecture Notes in Computer Science, Vol. 718, pp.196–208, Springer-Verlag, 1993.Google Scholar
  13. [13]
    D. Coppersmith, The Real Reason for Rivest’s Phenomenon, Proc. CRYPTO’85, pp.535–536, Springer-Verlag, 1986.Google Scholar
  14. [14]
    J. H. Moore and G. J. Simmons, Cycle Structure of the DES with Weak and Semi-Weak Keys, Proc. CRYPTO’86, pp.9–32, Springer-Verlag, 1987.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Selçuk Kavut
    • 1
  • Melek D. Yücel
    • 1
  1. 1.Electrical & Electronics Eng. Dept.Middle East Technical University TÜBİTAK-BİLTEN, Information Technologies and Electronics Research InstituteAnkaraTurkey

Personalised recommendations