At Crypto’90, Koyama and Terada proposed a family of cryptographic functions for application to symmetric block ciphers. Youssef and Tavares showed that this family is affine and hence it is completely insecure. In response to this, Koyama and Terada modified their design, by including a data dependent operation between layers. The modified family of circuits was presented in the first international security workshop (ISW’97). In this paper, we show that the modified circuit can be easily broken by a differential-like attack. More explicitly, we show that after d rounds, and for any specific key K, the input space can be partitioned into M ≤ 2d sets such that the ciphertext Y of each set is related to the plaintext X by an affine relation. The expected value of M ≪ 2d. Our attack enables us to explicitly recover these linear relations. We were able to break an 8−round 64−bit version of this family in few minutes on a workstation using less than 220 chosen plaintext-ciphertext pairs.
CITATION STYLE
Youssef, A. M. (2001). Cryptanalysis of the “Augmented family of cryptographic parity Circuits” proposed at ISW’97. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2012, pp. 29–38). Springer Verlag. https://doi.org/10.1007/3-540-44983-3_3
Mendeley helps you to discover research relevant for your work.