Integral Cryptanalysis of ARIA
This paper studies the security of the block cipher ARIA against integral attack. The designers believe that determining whether any given byte position is balanced or not after 3 rounds of encryption is not possible. However, by determining the times that each element of the output of the second round appears is an even integer, we find some 3-round integral distinguishers of ARIA in this paper, which may lead to possible attacks on 4, 5 and 6-round ARIA. Both the data and time complexities of 4-round attack are 225; the data and time complexities of 5-round attack are 227.2 and 276.7, respectively; the data and time complexities of 6-round attack are 2124.4 and 2172.4, respectively. Moreover, the 4 and 5-round attacks have the lowest data and time complexities compared to existing attacks on ARIA. Our results also show that the choice of S-box and different order of S-boxes do have influence on integral attacks.
Keywordsblock cipher ARIA integral cryptanalysis counting method
Unable to display preview. Download preview PDF.
- 1.Kwon, D., Kim, J., Park, S., Sung, S.H., et al.: New Block Cipher: ARIA. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 432–445. Springer, Heidelberg (2004)Google Scholar
- 3.Biryukov, A., De Canniere, C., Lano, J., Ors, S.B., Preneel, B.: Security and Performance Analysis of Aria. Version 1.2., January 7 (2004)Google Scholar
- 4.National Security Research Institute, Korea. Specification of ARIA. Version 1.0. (January 2005)Google Scholar
- 6.Li, R., Sun, B., Zhang, P., Li, C.: New Impossible Differentials of ARIA. Cryptology ePrint Archive, Report 2008/227 (2008), http://eprint.iacr.org/
- 7.Fleischmann, E., Gorski, M., Lucks, S.: Attacking Reduced Rounds of the ARIA Block Cipher. To appear in WEWoRC 2009 (2009); Cryptology ePrint Archive, Report 2009/334, http://eprint.iacr.org/
- 14.Sun, B., Li, R., Li, C.: SQUARE attack on Block Ciphers with Low Algebraic Degree. To appear in Science in China, Ser. F-Inf. Sci.Google Scholar
- 16.Daemen, J., Rijmen, V.: The Design of Rijndael: AES — The Advanced Encryption Standard, Information Security and Cryptography. Springer, Heidelberg (2002)Google Scholar