Impossible Di!erential Cryptanalysis of CLEFIA

msra

引用 23|浏览19
暂无评分
摘要
This paper reports impossible di!erential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007, including new 9-round impossible di!erentials for CLEFIA, and the result of an impossible di!erential attack using them. For the case of a 128-bit key, it is possible to apply the impossible di!erential attack to CLEFIA re- duced to 12 rounds. The number of chosen plaintexts required is 2 118.9 and the time complexity is 2 119 . For key lengths of 192 bits and 256 bits, it is possible to apply impossible di!erential attacks to 13-round and 14- round CLEFIA. The respective numbers of chosen plaintexts required are 2 119.8 and 2 120.3 and the respective time complexities are 2 147 and 2 211 . These impossible di!erential attacks are the strongest method for attacking reduced-round CLEFIA.
更多
查看译文
关键词
impossible di!erential cryptanalysis.,gen- eralized feistel structure,clefia,block cipher,di!usion switching mechanism
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要