Cryptanalysis of 256-bit key HyRAL via equivalent keys

1Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

HyRAL is a blockcipher whose block size is 128 bits, and it supports the key lengths of 128, 129, ...,256 bits. The cipher was proposed for the CRYPTREC project, and previous analyses did not identify any security weaknesses. In this paper, we consider the longest key version, 256-bit key HyRAL, and present the analysis in terms of equivalent keys. First, we show that there are 2 51.0 equivalent keys (or 2 50.0 pairs of equivalent keys). Next, we propose an algorithm that derives an instance of equivalent keys with the expected time complexity of 2 48.8 encryptions and a limited amount of memory. Finally, we implement the proposed algorithm and fully verify its correctness by showing several instances of equivalent keys. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Asano, Y., Yanagihara, S., & Iwata, T. (2012). Cryptanalysis of 256-bit key HyRAL via equivalent keys. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7341 LNCS, pp. 257–274). https://doi.org/10.1007/978-3-642-31284-7_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free