Paper 2013/756
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
Yonglin Hao, Dongxia Bai, and Leibo Li
Abstract
This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96/128. We construct a 4-round distinguisher and lower the memory requirement from
Metadata
- Available format(s)
-
PDF
- Publication info
- Published elsewhere. Minor revision. Network and System Security (NSS 2014)
- DOI
- 10.1007/978-3-319-11698-3_13
- Keywords
- mCryptonMITM AttackEfficient Differential Enumeration TechniqueKey Bridging Tchnique
- Contact author(s)
- koala89 @ 163 com
- History
- 2016-03-31: revised
- 2013-11-17: received
- See all versions
- Short URL
- https://ia.cr/2013/756
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/756, author = {Yonglin Hao and Dongxia Bai and Leibo Li}, title = {A Meet-in-the-Middle Attack on Round-Reduced {mCrypton} Using the Differential Enumeration Technique}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/756}, year = {2013}, doi = {10.1007/978-3-319-11698-3_13}, url = {https://eprint.iacr.org/2013/756} }