Skip to main content

Differential-Linear Cryptanalysis of Camellia

  • Chapter
Progress on Cryptography

Part of the book series: The International Series in Engineering and Computer Science ((SECS,volume 769))

Abstract

Camellia is the final selection of 128-bit block cipher in NESSIE. In this paper, we present differential-linear cryptanalysis of modified camellia reduced to 9 and 10 rounds. For modified camellia with 9 rounds we can find the user key with 214 chosen plaintexts and 2185.5 encryptions and for modified camellia with 10 rounds we can find the user key with 214 chosen plaintexts and 2245.6 encryptions.

This work was supported by Chinese Natural Science Foundation (Grant No. 60373047) and 863 Project (Grant No. 2003AA14403)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita, Specification of Camellia-a 128-bit Block Cipher, in Proceedings of Selected Areas in Cryptography-SAC’2000, in Lecture Notes in Computer Science, pp. 183–191, Springer-Verlag, 2000.

    Google Scholar 

  2. T. Kawabata, T. Kaneko, A study on higher order differential attack of Camellia, Proceedings of the 2nd NESSIE workshop, 2001.

    Google Scholar 

  3. Y. Hatano, H. Sekine, and T. Kaneko, Higher order differential attack of Camellia(II), in Proceedings of Selected Areas in Cryptography-SAC’02, Lecture Notes in Computer Science, pp.39–56, Springer-Verlag, 2002.

    Google Scholar 

  4. M. Sugita, K. Kobara, and H. Imai, Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis, in Proceedings of Asiacrypt’01 (C. Boyd, ed.), no. 2248 in Lecture Notes in Computer Science, pp. 193–207, Springer-Verlag, 2001.

    Google Scholar 

  5. T. Shirai, S. Kanamaru, and G. Abe, Improved upper bounds of differential and linear characteristic probability for Camellia, in Proceedings of Fast Software Encryption-FSE’02 (J. Daemen and V. Rijmen, ed.), no. 2365 in Lecture Notes in Computer Science, pp. 128–142, Springer-Verlag, 2002.

    Google Scholar 

  6. He Ye-ping and Qing Si-han, Square attack on Reduced Camellia Cipher, ICICS’01 (Qing Si-han, ed,), no. 2229 in Lecture Notes in Computer Science, pp. 238–245, Springer-Verlag, 2001.

    Google Scholar 

  7. Y. Yeom, S. Park, and I. Kim, On the security of Camellia against the square attack, in Proceedings of Fast Software Encryption-FSE’02 (J. Daemen and V. Rijmen, ed.), no. 2365 in Lecture Notes in Computer Science, pp. 89–99, Springer-Verlag, 2002.

    Google Scholar 

  8. Y. Yeom, I. Park, and I. Kim, A study of Integral type cryptanalysis on Camellia, The 2003 Symposium on Cryptography and Information Security-SCIS’03

    Google Scholar 

  9. S.K. Langford and M.E. Hellman, Differential-Linear Cryptanalysis, in Proceedings of Crptology-CRYPTO’94, pp. 17–26, Springer-Verlag, 1994.

    Google Scholar 

  10. Wen-Ling Wu and Deng-Guo Feng, Collision Attack on Reduced-Round Camellia, Cryptology eprint Archive Report 2003/135, http://eprint.iacr.org/2003/135

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Kluwer Academic Publishers

About this chapter

Cite this chapter

Wu, W., Feng, D. (2004). Differential-Linear Cryptanalysis of Camellia. In: Chen, K. (eds) Progress on Cryptography. The International Series in Engineering and Computer Science, vol 769. Springer, Boston, MA. https://doi.org/10.1007/1-4020-7987-7_24

Download citation

  • DOI: https://doi.org/10.1007/1-4020-7987-7_24

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-7986-3

  • Online ISBN: 978-1-4020-7987-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics