Abstract
Camellia is the final selection of 128-bit block cipher in NESSIE. In this paper, we present differential-linear cryptanalysis of modified camellia reduced to 9 and 10 rounds. For modified camellia with 9 rounds we can find the user key with 214 chosen plaintexts and 2185.5 encryptions and for modified camellia with 10 rounds we can find the user key with 214 chosen plaintexts and 2245.6 encryptions.
This work was supported by Chinese Natural Science Foundation (Grant No. 60373047) and 863 Project (Grant No. 2003AA14403)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita, Specification of Camellia-a 128-bit Block Cipher, in Proceedings of Selected Areas in Cryptography-SAC’2000, in Lecture Notes in Computer Science, pp. 183–191, Springer-Verlag, 2000.
T. Kawabata, T. Kaneko, A study on higher order differential attack of Camellia, Proceedings of the 2nd NESSIE workshop, 2001.
Y. Hatano, H. Sekine, and T. Kaneko, Higher order differential attack of Camellia(II), in Proceedings of Selected Areas in Cryptography-SAC’02, Lecture Notes in Computer Science, pp.39–56, Springer-Verlag, 2002.
M. Sugita, K. Kobara, and H. Imai, Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis, in Proceedings of Asiacrypt’01 (C. Boyd, ed.), no. 2248 in Lecture Notes in Computer Science, pp. 193–207, Springer-Verlag, 2001.
T. Shirai, S. Kanamaru, and G. Abe, Improved upper bounds of differential and linear characteristic probability for Camellia, in Proceedings of Fast Software Encryption-FSE’02 (J. Daemen and V. Rijmen, ed.), no. 2365 in Lecture Notes in Computer Science, pp. 128–142, Springer-Verlag, 2002.
He Ye-ping and Qing Si-han, Square attack on Reduced Camellia Cipher, ICICS’01 (Qing Si-han, ed,), no. 2229 in Lecture Notes in Computer Science, pp. 238–245, Springer-Verlag, 2001.
Y. Yeom, S. Park, and I. Kim, On the security of Camellia against the square attack, in Proceedings of Fast Software Encryption-FSE’02 (J. Daemen and V. Rijmen, ed.), no. 2365 in Lecture Notes in Computer Science, pp. 89–99, Springer-Verlag, 2002.
Y. Yeom, I. Park, and I. Kim, A study of Integral type cryptanalysis on Camellia, The 2003 Symposium on Cryptography and Information Security-SCIS’03
S.K. Langford and M.E. Hellman, Differential-Linear Cryptanalysis, in Proceedings of Crptology-CRYPTO’94, pp. 17–26, Springer-Verlag, 1994.
Wen-Ling Wu and Deng-Guo Feng, Collision Attack on Reduced-Round Camellia, Cryptology eprint Archive Report 2003/135, http://eprint.iacr.org/2003/135
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Kluwer Academic Publishers
About this chapter
Cite this chapter
Wu, W., Feng, D. (2004). Differential-Linear Cryptanalysis of Camellia. In: Chen, K. (eds) Progress on Cryptography. The International Series in Engineering and Computer Science, vol 769. Springer, Boston, MA. https://doi.org/10.1007/1-4020-7987-7_24
Download citation
DOI: https://doi.org/10.1007/1-4020-7987-7_24
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-7986-3
Online ISBN: 978-1-4020-7987-0
eBook Packages: Springer Book Archive