Paper 2003/135

Collision Attack on Reduced-Round Camellia

Wen-Ling Wu and Deng-Guo Feng

Abstract

Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack on 6,7,8 and 9 rounds of Camellia with 128-bit key and 8,9 and 10 rounds of Camellia with 192/256-bit key. The 128-bit key of 6 rounds Camellia can be recovered with 210 chosen plaintexts and 215 encryptions. The 128-bit key of 7 rounds Camellia can be recovered with chosen plaintexts and encryptions. The 128-bit key of 8 rounds Camellia can be recovered with chosen plaintexts and encryptions. The 128-bit key of 9 rounds Camellia can be recovered with chosen plaintexts and encryptions. The 192/256-bit key of 8 rounds Camellia can be recovered with chosen plaintexts and encryptions. The 192/256-bit key of 9 rounds Camellia can be recovered with chosen plaintexts and encryptions.The 256-bit key of 10 rounds Camellia can be recovered with chosen plaintexts and encryptions.

Metadata
Available format(s)
PDF PS
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Block CipherCamellia
Contact author(s)
wwl @ ercist iscas ac cn
wwl369 @ yahoo com cn
History
2003-07-17: received
Short URL
https://ia.cr/2003/135
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2003/135,
      author = {Wen-Ling Wu and Deng-Guo Feng},
      title = {Collision Attack on Reduced-Round Camellia},
      howpublished = {Cryptology {ePrint} Archive, Paper 2003/135},
      year = {2003},
      url = {https://eprint.iacr.org/2003/135}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.