Cryptology ePrint Archive: Report 2015/557

Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers

Takanori Isobe and Kyoji Shibutani

Abstract: The all-subkeys recovery (ASR) attack is an extension of the meet-in-the-middle attack, which allows evaluating the security of a block cipher without analyzing its key scheduling function. Combining the ASR attack with some advanced techniques such as the function reduction and the repetitive ASR attack, we show the improved ASR attacks on the 7-round reduced FOX64 and FOX128. Moreover, the improved ASR attacks on the 119-, 105- and 99-round reduced KATAN32, KATAN48 and KATAN64, and the 42-round reduced SHACAL-2 are also presented, respectively. As far as we know, all of those attacks are the best single-key attacks with respect to the number of attacked rounds in literature.

Category / Keywords: secret-key cryptography / block cipher, meet-in-the-middle attack, all-subkeys recovery attack

Original Publication (with minor differences): IACR-FSE-2014
DOI:
10.1007/978-3-662-46706-0_6

Date: received 5 Jun 2015

Contact author: Takanori Isobe at jp sony com

Available format(s): PDF | BibTeX Citation

Version: 20150615:071004 (All versions of this report)

Short URL: ia.cr/2015/557

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]