Analysis of two attacks on reduced-round versions of the SMS4

25Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

SMS4 is a 128-bit block cipher used in WAPI (the Chinese national standard for wireless networks). Up until recently, the best attacks on SMS4 known, in terms of the number of rounds, were the rectangle attack on 14 rounds and the impossible differential attack on 16 rounds (out of 32 rounds) presented by Lu. While analyzing them, we noticed that these attacks have flaws and that their complexity analysis is inaccurate. In this paper we make a more comprehensive analysis of these attacks and further improve these results. © 2008 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Toz, D., & Dunkelman, O. (2008). Analysis of two attacks on reduced-round versions of the SMS4. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5308 LNCS, pp. 141–156). Springer Verlag. https://doi.org/10.1007/978-3-540-88625-9_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free