Paper 2015/557

Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers

Takanori Isobe and Kyoji Shibutani

Abstract

The all-subkeys recovery (ASR) attack is an extension of the meet-in-the-middle attack, which allows evaluating the security of a block cipher without analyzing its key scheduling function. Combining the ASR attack with some advanced techniques such as the function reduction and the repetitive ASR attack, we show the improved ASR attacks on the 7-round reduced FOX64 and FOX128. Moreover, the improved ASR attacks on the 119-, 105- and 99-round reduced KATAN32, KATAN48 and KATAN64, and the 42-round reduced SHACAL-2 are also presented, respectively. As far as we know, all of those attacks are the best single-key attacks with respect to the number of attacked rounds in literature.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
A minor revision of an IACR publication in FSE 2014
DOI
10.1007/978-3-662-46706-0_6
Keywords
block ciphermeet-in-the-middle attackall-subkeys recovery attack
Contact author(s)
Takanori Isobe @ jp sony com
History
2015-06-15: received
Short URL
https://ia.cr/2015/557
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/557,
      author = {Takanori Isobe and Kyoji Shibutani},
      title = {Improved All-Subkeys Recovery Attacks on {FOX}, {KATAN} and {SHACAL}-2 Block Ciphers},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/557},
      year = {2015},
      doi = {10.1007/978-3-662-46706-0_6},
      url = {https://eprint.iacr.org/2015/557}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.