用户名: 密码: 验证码:
Biclique Attack on the Full HIGHT
详细信息    查看全文
  • 作者:Deukjo Hong (17)
    Bonwook Koo (17)
    Daesung Kwon (17)
  • 关键词:HIGHT ; Biclique ; Cryptanalysis
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2012
  • 出版时间:2012
  • 年:2012
  • 卷:7259
  • 期:1
  • 页码:375-390
  • 全文大小:256KB
  • 参考文献:1. Biryukov, A., Khovratovich, D.: Related-Key Cryptanalysis of the Full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.聽5912, pp. 1鈥?8. Springer, Heidelberg (2009) CrossRef
    2. Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique Cryptanalysis of the Full AES. In: Lee, D.H. (ed.) ASIACRYPT 2011. LNCS, vol.聽7073, pp. 344鈥?71. Springer, Heidelberg (2011); Full paper is availavle at Cryptology ePrint Archive 2011/449 CrossRef
    3. Dunkelman, O., Keller, N., Shamir, A.: A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.聽6223, pp. 393鈥?10. Springer, Heidelberg (2010)
    4. Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.-S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.聽4249, pp. 46鈥?9. Springer, Heidelberg (2006) CrossRef
    5. International Organization for Standardization, 鈥淚nformation technology 鈥?Security techniques 鈥?Encryption algorithms 鈥?Part 3: Block ciphers,鈥?ISO/IEC 18033-3:2005 (2005)
    6. Koo, B., Hong, D., Kwon, D.: Related-Key Attack on the Full HIGHT. In: Rhee, K.-H., Nyang, D. (eds.) ICISC 2010. LNCS, vol.聽6829, pp. 49鈥?7. Springer, Heidelberg (2011) CrossRef
    7. Lu, J.: Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol.聽4817, pp. 11鈥?6. Springer, Heidelberg (2007) CrossRef
    8. 脰zen, O., Var谋c谋, K., Tezcan, C., Kocair, 脟.: Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. In: Boyd, C., Gonz谩lez Nieto, J. (eds.) ACISP 2009. LNCS, vol.聽5594, pp. 90鈥?07. Springer, Heidelberg (2009) CrossRef
    9. Wagner, D.: The Boomerang Attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.聽1636, pp. 156鈥?70. Springer, Heidelberg (1999) CrossRef
    10. Zhang, P., Sun, B., Li, C.: Saturation Attack on the Block Cipher HIGHT. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.聽5888, pp. 76鈥?6. Springer, Heidelberg (2009) CrossRef
  • 作者单位:Deukjo Hong (17)
    Bonwook Koo (17)
    Daesung Kwon (17)

    17. ETRI, Korea
文摘
HIGHT is a lightweight block cipher proposed at CHES 2006 and included in ISO/IEC 18033-3. In this paper, we apply recently proposed biclique cryptanalysis to attack HIGHT. We show that bicliques can be constructed for 8 rounds in HIGHT, and those are used to recover the 128-bit key for the full rounds of HIGHT with the computational complexity of 2126.4, faster than exhaustive search. This is the first single-key attack result for the full HIGHT.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700