Related key attacks on reduced round kasumi

30Citations
Citations of this article
42Readers
Mendeley users who have this article in their library.

Abstract

This paper describes related key attacks on five and six round KASUMI. The five round attack requires the encryption of approximately 219 chosen plaintext pairs X and X ∗ under keys K and K ∗ respectively where K and K ∗ differ in only one bit, and requires a maximum of a little over 233 trials to recover the entire key. The sixround attack requires a smaller number of chosen plaintext encryptions than the five round attack, and recovers the entire key in a maximum of 2112 trials.

Cite

CITATION STYLE

APA

Blunden, M., & Escott, A. (2002). Related key attacks on reduced round kasumi. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2355, pp. 277–285). Springer Verlag. https://doi.org/10.1007/3-540-45473-X_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free