Cryptanalysis of the “Augmented family of cryptographic parity Circuits” proposed at ISW’97

0Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

At Crypto’90, Koyama and Terada proposed a family of cryptographic functions for application to symmetric block ciphers. Youssef and Tavares showed that this family is affine and hence it is completely insecure. In response to this, Koyama and Terada modified their design, by including a data dependent operation between layers. The modified family of circuits was presented in the first international security workshop (ISW’97). In this paper, we show that the modified circuit can be easily broken by a differential-like attack. More explicitly, we show that after d rounds, and for any specific key K, the input space can be partitioned into M ≤ 2d sets such that the ciphertext Y of each set is related to the plaintext X by an affine relation. The expected value of M ≪ 2d. Our attack enables us to explicitly recover these linear relations. We were able to break an 8−round 64−bit version of this family in few minutes on a workstation using less than 220 chosen plaintext-ciphertext pairs.

Cite

CITATION STYLE

APA

Youssef, A. M. (2001). Cryptanalysis of the “Augmented family of cryptographic parity Circuits” proposed at ISW’97. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2012, pp. 29–38). Springer Verlag. https://doi.org/10.1007/3-540-44983-3_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free