Improved impossible differentials on Twofish

3Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Twofish is one of the finalists for the Advanced Encryption Standard selection process (AES). The best up-to-date analysis of Twofish was presented by one of its designers, who showed that its complexity on 6-round Twofish with 128-bit keys is 4.6 2128 one-round computations. In this paper we present an improvement of the attack on 6-round Twofish, whose complexity is 1.84 · 2128 one-round computations. For other key sizes, our results have the complexity 13 · 2160 one-round computations for 192-bit keys and 24.2·2192 one-round computations for 256-bit keys. For 7-round Twofish, the designers mentioned an attack, and estimated its complexity to be about 2256 simple steps for 256-bit keys, and for other key sizes have complexities that exceed exhaustive search. We present an improvement of the attack on 7-round Twofish, whose complexity is 2226.48 one-round computations for 256-bit keys. We also show, for the first time, that this attack is faster than exhaustive search for 192-bit keys for which it breaks 7-round Twofish in 2 · 2192 one-round computations, while exhaustive search takes 7 · 2192.

Cite

CITATION STYLE

APA

Biham, E., & Furman, V. (2000). Improved impossible differentials on Twofish. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1977, pp. 80–92). Springer Verlag. https://doi.org/10.1007/3-540-44495-5_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free