Paper 2016/267
Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256
Yonglin Hao
Abstract
The meet-in-the-middle (MITM) attack has prove to be efficient in analyzing the AES block cipher.
Its efficiency has been increasing with the introduction of various techniques such as differential enumeration, key-dependent sieve, super-box etc.
The recent MITM attack given by Li and Jin has successfully mounted to 10-round AES-256.
Crypton is an AES-like block cipher.
In this paper, we apply the MITM method to the cryptanalysis of Crypton-256.
Following Li and Jin's idea, we give the first 6-round distinguisher for Crypton.
Based on the distinguisher as well as the properties of Crypton's simple key schedule, we successfully launch MITM attacks on Crypton-256 reduced to 9 and 10 rounds.
For 9-round Crypton-256, our MITM attack can recover the 256-bit key with a time complexity
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- CryptanalysisCryptonMITMKey-Dependent SieveSuper-Box
- Contact author(s)
- haoyl12 @ mails tsinghua edu cn
- History
- 2016-03-10: received
- Short URL
- https://ia.cr/2016/267
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/267, author = {Yonglin Hao}, title = {Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/267}, year = {2016}, url = {https://eprint.iacr.org/2016/267} }