Advertisement

Square-like Attacks on Reduced Rounds of IDEA

  • Hüseyin Demirci
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2595)

Abstract

In this paper we develop two new chosen plaintext attacks on reduced rounds of the IDEA block cipher. The attacks exploit the word structure of the algorithm and are based on the observation that suitable chosen plaintexts give rise to some special kind of distributions which provide a way to distinguish reduced round IDEA output from a random permutation with very few plaintexts. As a result, we develop an attack for 3.5 rounds of IDEA which requires only 103 chosen plaintexts. We have reduced the number of required plaintexts significantly up to 4 rounds. We also present some interesting properties of the reduced round variants of the cipher which have not been published before. The properties and the attacks bring a different approach to analyse the cipher.

Keywords

Random Permutation Block Cipher Elimination Process Total Complexity Word Structure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    E. Biham, A. Biryukov, A. Shamir, Miss in the Middle Attacks on IDEA and Khufu, LNCS 1636, Proceedings of Fast Software Encryption-6th International Workshop, FSE’ 99, pp. 124–138, Springer-Verlag, 1999.Google Scholar
  2. 2.
    A. Biryukov, A. Shamir, Structural Cryptanalysis of SASAS, LNCS 2045, Advances in Cryptology-Proceedings of EUROCRYPT’2001, pp. 394–405, Springer-Verlag, 2001.Google Scholar
  3. 3.
    J. Borst, L. R. Knudsen, V. Rijmen, Two Attacks on Reduced IDEA (extended abstract), LNCS 1223, Advances in Cryptology-Proceedings of EUROCRYPT’97, pp. 1–13, Springer-Verlag, 1997.Google Scholar
  4. 4.
    J. Daemen, R. Govaerts, J. Vandewalle, Cryptanalysis of 2.5 round of IDEA (extended abstract), Technical Report ESAC-COSIC Technical Report 93/1, Department Of Electrical Engineering, Katholieke Universiteit Leuven, March 1993.Google Scholar
  5. 5.
    J. Daemen, L. Knudsen and V. Rijmen, The Block Cipher SQUARE, LNCS 1267, FSE’97, pp. 149–165, Springer-Verlag, 1997.Google Scholar
  6. 7.
    K. Hwang, W. Lee, S. Lee, S. Lee, J. Lim, Saturation Attacks on Reduced Round Skipjack, FSE’2002, Pre-Proceedings.Google Scholar
  7. 8.
    L. Knudsen, D. Wagner, Integral Cryptanalysis, FSE’2002, Pre-Proceedings.Google Scholar
  8. 9.
    X. Lai, J. L. Massey, A Proposal for a New Block Encryption Standard, LNCS 473, Advances in Cryptology-Proceedings of EUROCRYPT’90, pp. 389–404, Springer-Verlag, 1991.Google Scholar
  9. 10.
    X. Lai, J. L. Massey and S. Murphy, Markov Ciphers and Differential Cryptanalysis, LNCS 547, Advances in Cryptology-Proceedings of EUROCRYPT’91, pp. 17–38,Springer-Verlag, 1991.Google Scholar
  10. 11.
    X. Lai, On the Design and Security of the Block Ciphers, ETH Series in Information Processing, Volume 1, Hartung-Gorre Verlag Konstanz, 1995.Google Scholar
  11. 12.
    S. Lucks, The Saturation Attack-a Bait for Twofish, LNCS 1039, FSE’2001, pp. 189–203, Springer-Verlag, 2001.Google Scholar
  12. 13.
    W. Meier, On the Security of the IDEA Block Cipher, LNCS 765, Advances in Cryptology-Proceedings of EUROCRYPT’93, pp. 371–385, Springer-Verlag, 1994.Google Scholar
  13. 14.
    J. Nakahara Jr., P.S.L.M. Barreto, B. Preneel, J. Vandewalle, H.Y. Kim, SQUARE Attacks Against Reduced-Round PES and IDEA Block Ciphers, IACR Cryptology ePrint Archive, Report 2001/068, 2001.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Hüseyin Demirci
    • 1
  1. 1.Tübitak UEKAEKocaeliTurkey

Personalised recommendations