Advertisement

Truncated Differential Attacks on 8-Round CRYPTON

  • Jongsung Kim
  • Seokhie Hong
  • Sangjin Lee
  • Junghwan Song
  • Hyungjin Yang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2971)

Abstract

CRYPTON [8] is a 12-round block cipher proposed as an AES candidate by C.H. Lim in 1998. C.H. Lim also introduced in 1999 [9] a modified CRYPTON with a new key schedule and new S-boxes. This paper presents truncated differential attacks on the modified CRYPTON up to 8 out of its 12 rounds. These are the best known attacks for this cipher.

Keywords

Block Cipher Truncated Differential Attack CRYPTON 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Baudron, O., Gilbert, H., Granboulan, L., Handschuh, H., Joux, A., Nguyen, P., Noilhan, F., Pointcheval, D., Pornin, T., Poupard, G., Stern, J., Vaudenay, S.: Report on the AES Candidates. In: The Second Advanced Encryption Standard Candidate Conference, N. I. S.T (1999)Google Scholar
  2. 2.
    Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)Google Scholar
  3. 3.
    Cheon, J., Kim, M., Kim, K., Lee, J.: Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 39–49. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Daemen, J., Knudsen, L., Rijndael, V.: The block cipher Square. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 149–171. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  5. 5.
    Daemen, J., Rijndael, V.: The Rijndael block cipher. AES proposal (1998)Google Scholar
  6. 6.
    D’Halluin, C., Bijnens, G., Rijmen, V., Preneel, B.: Attack on Six Rounds of Crypton. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 46–59. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  7. 7.
    Knudsen, L.R.: Trucated and Higher Order Differentials. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 196–211. Springer, Heidelberg (1996)Google Scholar
  8. 8.
    Lim, C.: CRYPTON : A New 128-bit Block Cipher. AES Proposal (1998)Google Scholar
  9. 9.
    Lim, C.: A Revised Version of Crypton - Crypton Version 1.0. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 31–45. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  10. 10.
    Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)Google Scholar
  11. 11.
    Minier, M., Gilbert, H.: Stochastic Cryptanalysis of Crypton. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 121–133. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  12. 12.
    Nyberg, K., Knudsen, L.R.: Provable security against differential cryptanalysis. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 566–574. Springer, Heidelberg (1993)Google Scholar
  13. 13.
    Seki, H., Kaneko, T.: Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 45–51. Springer, Heidelberg (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Jongsung Kim
    • 1
  • Seokhie Hong
    • 1
  • Sangjin Lee
    • 1
  • Junghwan Song
    • 2
  • Hyungjin Yang
    • 1
  1. 1.Center for Information Security Technologies(CIST) Korea UniversitySeoulKorea
  2. 2.Department of MathematicsHanyang UniversitySeoulKorea

Personalised recommendations