Paper 2012/594

Improved Impossible Differential Attack on Reduced Version of Camellia-192/256

Ya Liu, Dawu Gu, Zhiqiang Liu, and Wei Li

Abstract

As an ISO/IEC international standard, Camellia has been used various cryptographic applications. In this paper, we improve previous attacks on Camellia-192/256 with key-dependent layers FL/FL1 by using the intrinsic weakness of keyed functions. Specifically, we present the first impossible differential attack on 13-round Camellia with 2121.6 chosen ciphertexts and 2189.9 13-round encryptions, while the analysis for the biggest number of rounds in previous results on Camellia-192 worked on 12 rounds. Furthermore, we successfully attack 14-round Camellia-256 with 2122.1 chosen ciphertexts and 2229.3 14-round encryptions. Compared with the previously best known attack on 14-round Camellia-256, the time complexity of our attack is reduced by 28.9 times and the data complexity is comparable.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Submit to Information Processing Letters
Keywords
Block CipherCamelliaImpossible Differential Cryptanalysis
Contact author(s)
liuyaloccs @ gmail com
History
2012-10-25: received
Short URL
https://ia.cr/2012/594
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/594,
      author = {Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li},
      title = {Improved Impossible Differential Attack on Reduced Version of Camellia-192/256},
      howpublished = {Cryptology {ePrint} Archive, Paper 2012/594},
      year = {2012},
      url = {https://eprint.iacr.org/2012/594}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.