Part of the Lecture Notes in Computer Science book series (LNCS, volume 1592)
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
In this paper we present a new cryptanalytic technique, based on impossible differentials, and use it to show that Skipjack reduced from 32 to 31 rounds can be broken by an attack which is faster than exhaustive search.
Key wordsSkipjack Cryptanalysis Differential cryptanalysis Impossible differentials
- 1.Carlisle M. Adams, The CAST-256 Encryption Algorithm, AES submission, available at http://www.entrust.com/resources/pdf/cast-256.pdf.
- 2.Ishai Ben-Aroya, Eli Biham, Differential Cryptanalysis of Lucifer, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’93, pp. 187–199, 1993.Google Scholar
- 3.Eli Biham, Cryptanalysis of Ladder-DES, proceedings of Fast Software Encryption, Haifa, Lecture Notes in Computer Science, pp. 134–138, 1997.Google Scholar
- 4.Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir, Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR, proceedings of Selected Areas in Cryptography, SAC’1998, Lecture Notes in Computer Science, 1998.Google Scholar
- 5.Eli Biham, Alex Biryukov, Adi Shamir, Miss in the Middle Attacks on IDEA, Khufu and Khafre, proceedings of Fast Software Encryption, Rome, Lecture Notes in Computer Science, 1999.Google Scholar
- 6.Eli Biham, Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.Google Scholar
- 7.Cipher A. Deavours, Louis Kruh, Machine Cryptography and Modern Cryptanalysis, Artech House, 1985.Google Scholar
- 8.Lars Ramkilde Knudsen, DEAL-A 128-bit Block Cipher, AES submission, available at http://www.ii.uib.no/~larsr/papers/deal.ps, 1998.
- 9.Lars Ramkilde Knudsen, Matt Robshaw, David Wagner, private communication, 1998.Google Scholar
- 10.Xuejia Lai, James L. Massey, Sean Murphy, Markov Ciphers and Differential Cryptanalysis, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’91, pp. 17–38, 1991.Google Scholar
- 11.Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’93, pp. 386–397, 1993.Google Scholar
- 12.Ralph C. Merkle, Fast Software Encryption Functions, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’90, pp. 476–501, 1990.Google Scholar
- 13.Shoji Miyaguchi, Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm FEAL-8, Review of electrical communications laboratories, Vol. 36, No. 4, pp. 433–437, 1988.Google Scholar
- 14.National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46, January 1977.Google Scholar
- 15.Skipjack and KEA Algorithm Specifications, Version 2.0, 29 May 1998. Available at the National Institute of Standards and Technology’s web page, http://csrc.nist.gov/encryption/skipjack-kea.htm.
- 16.Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encryption Algorithm FEAL, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’87, pp. 267–278, 1987.Google Scholar
- 17.David Wagner, Further Attacks on 16 Rounds of SkipJack, private communication, July 1998.Google Scholar
© Springer-Verlag Berlin Heidelberg 1999