Advertisement

Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials

  • Eli Biham
  • Alex Biryukov
  • Adi Shamir
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1592)

Abstract

In this paper we present a new cryptanalytic technique, based on impossible differentials, and use it to show that Skipjack reduced from 32 to 31 rounds can be broken by an attack which is faster than exhaustive search.

Key words

Skipjack Cryptanalysis Differential cryptanalysis Impossible differentials 

References

  1. 1.
    Carlisle M. Adams, The CAST-256 Encryption Algorithm, AES submission, available at http://www.entrust.com/resources/pdf/cast-256.pdf.
  2. 2.
    Ishai Ben-Aroya, Eli Biham, Differential Cryptanalysis of Lucifer, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’93, pp. 187–199, 1993.Google Scholar
  3. 3.
    Eli Biham, Cryptanalysis of Ladder-DES, proceedings of Fast Software Encryption, Haifa, Lecture Notes in Computer Science, pp. 134–138, 1997.Google Scholar
  4. 4.
    Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir, Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR, proceedings of Selected Areas in Cryptography, SAC’1998, Lecture Notes in Computer Science, 1998.Google Scholar
  5. 5.
    Eli Biham, Alex Biryukov, Adi Shamir, Miss in the Middle Attacks on IDEA, Khufu and Khafre, proceedings of Fast Software Encryption, Rome, Lecture Notes in Computer Science, 1999.Google Scholar
  6. 6.
    Eli Biham, Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.Google Scholar
  7. 7.
    Cipher A. Deavours, Louis Kruh, Machine Cryptography and Modern Cryptanalysis, Artech House, 1985.Google Scholar
  8. 8.
    Lars Ramkilde Knudsen, DEAL-A 128-bit Block Cipher, AES submission, available at http://www.ii.uib.no/~larsr/papers/deal.ps, 1998.
  9. 9.
    Lars Ramkilde Knudsen, Matt Robshaw, David Wagner, private communication, 1998.Google Scholar
  10. 10.
    Xuejia Lai, James L. Massey, Sean Murphy, Markov Ciphers and Differential Cryptanalysis, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’91, pp. 17–38, 1991.Google Scholar
  11. 11.
    Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’93, pp. 386–397, 1993.Google Scholar
  12. 12.
    Ralph C. Merkle, Fast Software Encryption Functions, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’90, pp. 476–501, 1990.Google Scholar
  13. 13.
    Shoji Miyaguchi, Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm FEAL-8, Review of electrical communications laboratories, Vol. 36, No. 4, pp. 433–437, 1988.Google Scholar
  14. 14.
    National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46, January 1977.Google Scholar
  15. 15.
    Skipjack and KEA Algorithm Specifications, Version 2.0, 29 May 1998. Available at the National Institute of Standards and Technology’s web page, http://csrc.nist.gov/encryption/skipjack-kea.htm.
  16. 16.
    Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encryption Algorithm FEAL, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’87, pp. 267–278, 1987.Google Scholar
  17. 17.
    David Wagner, Further Attacks on 16 Rounds of SkipJack, private communication, July 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Eli Biham
    • 1
  • Alex Biryukov
    • 2
  • Adi Shamir
    • 3
  1. 1.Computer Science DepartmentTechnion - Israel Institute of TechnologyHaifaIsrael
  2. 2.Applied Mathematics DepartmentTechnion - Israel Institute of TechnologyHaifaIsrael
  3. 3.Department of Applied Mathematics and Computer ScienceWeizmann Institute of ScienceRehovotIsrael

Personalised recommendations