New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA

被引:4
作者
Hernández Castro J.C. [1 ]
Isasi Viñuela P. [2 ]
机构
[1] L1FL-CNRS
[2] Computer Science Department, Carlos III University, 28911 Leganés, Madrid
关键词
Block ciphers; Cryptanalysis; Distinguishers; TEA; XTEA;
D O I
10.1007/BF03037657
中图分类号
学科分类号
摘要
Abstract Recently, a quick and simple way of creating very efficient distinguishers for cryptographic primitives such as block ciphers or hash functions, was presented and proved useful by the authors. In this paper, this cryptanalytic attack (named genetic cryptanalysis after its use of genetic algorithms) is shown to be successful when applied over reduced-round versions of the block cipher XTEA. Efficient distinguishers for XTEA are proposed for up to 4 cycles (8 rounds). Additionally, a variant of this genetic attack is also introduced, and their results over the block cipher TEA presented, which are the most powerful published to date. © Ohmsha, Ltd. 2005.
引用
收藏
页码:233 / 243
页数:10
相关论文
共 9 条
[1]  
Hernandez J.C., Isasi P., Finding efficient distinguishes for cryptographic mappings, with an application to the block cipher TEA, Proc. of the 2003 Congress on Evolutionary Computation CEC 2003, pp. 341-348, (2003)
[2]  
Knudsen L., Meier W., Correlations in RC6 with a reduced number of rounds, Proc. of the Seventh East Software Encryption Workshop, (2000)
[3]  
Shimoyama T., Takeuchi K., Hayakawa J., Correlation attack to the block cipher RC5 and the simplified variants of RC6, Proc. of the Third AES Candidate Conference AES3, (2000)
[4]  
Wheeler D., Needham R., TEA, a tiny encryption algorithm, Proc. of the 1995 Fast Software Encryption Workshop, pp. 97-110, (1995)
[5]  
Wagner D., Kelsey J., Schneier B., Related-key cryptoanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2 and TEA, Proc. of the ICICS'97 Conference, pp. 233-246, (1997)
[6]  
Moon D., Kyungdeok H., Wonil L., Et al., Impossible differential crypt-analysis of reduced round XTEA and TEA, Proc. of the Fast Software Encryption, FSE 2002, 2365, pp. 49-60, (2002)
[7]  
Kelsey J., Schneier B., Wagner D., Mod n Cryptoanalysis with applications against RC5P and M6, Proc. of the 1999 Fast Software Encryption Workshop, pp. 139-155, (1999)
[8]  
Forre R., The strict avalanche criterion: Special properties of boolean functions and extended definition, Advances in Cryptology-Proc. of CRYPTO'88, LNCS, 403, pp. 450-468, (1988)
[9]  
Biham E., Biryukov A., Shamir A., Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials, Technion Computer Science Department Technical Report CS0947, (1998)