Paper 2015/557
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
Takanori Isobe and Kyoji Shibutani
Abstract
The all-subkeys recovery (ASR) attack is an extension of the meet-in-the-middle attack, which allows evaluating the security of a block cipher without analyzing its key scheduling function. Combining the ASR attack with some advanced techniques such as the function reduction and the repetitive ASR attack, we show the improved ASR attacks on the 7-round reduced FOX64 and FOX128. Moreover, the improved ASR attacks on the 119-, 105- and 99-round reduced KATAN32, KATAN48 and KATAN64, and the 42-round reduced SHACAL-2 are also presented, respectively. As far as we know, all of those attacks are the best single-key attacks with respect to the number of attacked rounds in literature.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- A minor revision of an IACR publication in FSE 2014
- DOI
- 10.1007/978-3-662-46706-0_6
- Keywords
- block ciphermeet-in-the-middle attackall-subkeys recovery attack
- Contact author(s)
- Takanori Isobe @ jp sony com
- History
- 2015-06-15: received
- Short URL
- https://ia.cr/2015/557
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/557, author = {Takanori Isobe and Kyoji Shibutani}, title = {Improved All-Subkeys Recovery Attacks on {FOX}, {KATAN} and {SHACAL}-2 Block Ciphers}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/557}, year = {2015}, doi = {10.1007/978-3-662-46706-0_6}, url = {https://eprint.iacr.org/2015/557} }