New Attacks Against Reduced-Round Versions of IDEA

  • Pascal Junod
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3557)


In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced-round versions of IDEA (with 2, 2.5, 3, 3.5, and 4 rounds) which compare favourably with the best known attacks: some of them decrease considerably the time complexity given the same order of data at disposal while other ones decrease the amount of necessary known- or chosen-plaintext pairs under comparable time complexities. Additionally, we show how to trade time and memory for some of the known-plaintext attacks of Nakahara et al.


 Block ciphers IDEA Demirci-Biryukov relation 


  1. 1.
    Biham, E., Biryukov, A., Shamir, A.: Miss in the middle attacks on IDEA and khufu. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 124–138. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  2. 2.
    Biryukov, A., Nakahara, J., Preneel, B., Vandewalle, J.: New weak-key classes of IDEA. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 315–326. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  3. 3.
    Borst, J., Knudsen, L., Rijmen, V.: Two attacks on reduced IDEA. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 1–13. Springer, Heidelberg (1997)Google Scholar
  4. 4.
    Daemen, J., Govaerts, R., Vandewalle, J.: Weak keys for IDEA. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 224–231. Springer, Heidelberg (1994)Google Scholar
  5. 5.
    Demirci, H.: Square-like attacks on reduced rounds of IDEA. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 147–159. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Demirci, H., Selçuk, A., Türe, E.: A new meet-in-the-middle attack on the IDEA block cipher. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 117–129. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Garfinkel, S.: PGP: Pretty Good Privacy. O’Reilly and Associates, Sebastopol (1994)Google Scholar
  8. 8.
    Hawkes, P.: Differential-linear weak key classes of IDEA. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 112–126. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  9. 9.
    Knudsen, L., Mathiassen, J.: A chosen-plaintext linear attack on DES. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 262–272. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Lai, X.: On the design and security of block ciphers. ETH Series in Information Processing, vol. 1. Hartung-Gorre Verlag, Konstanz (1992)Google Scholar
  11. 11.
    Lai, X., Massey, J.L.: A proposal for a new block encryption standard. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 389–404. Springer, Heidelberg (1991)Google Scholar
  12. 12.
    Lai, X., Massey, J., Murphy, S.: Markov ciphers and differential cryptanalysis. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 17–38. Springer, Heidelberg (1991)Google Scholar
  13. 13.
    Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 1–11. Springer, Heidelberg (1994)Google Scholar
  14. 14.
    Meier, W.: On the security of the IDEA block cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 371–385. Springer, Heidelberg (1994)Google Scholar
  15. 15.
    Nakahara, J., Barreto, P., Preneel, B., Vandewalle, J., Kim, Y.: Square attacks on reduced-round PES and IDEA block ciphers. In: Macq, B., Quisquater, J.-J. (eds.) Proceedings of 23rd Symposium on Information Theory in the Benelux, Louvain-la-Neuve, Belgium, May 29-31, pp. 187–195 (2002)Google Scholar
  16. 16.
    Nakahara, J., Preneel, B., Vandewalle, J.: The Biryukov-Demirci attack on IDEA and MESH ciphers. Technical report, COSIC, ESAT, Katholieke Universiteit Leuven, Leuven, Belgium (2003)Google Scholar
  17. 17.
    Nakahara, J., Preneel, B., Vandewalle, J.: The biryukov-demirci attack on reduced-round versions of IDEA and MESH ciphers. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 98–109. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  18. 18.
    National Bureau of Standards, U. S. Department of Commerce. Data Encryption Standard (DES), FIPS 46 (1977)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Pascal Junod
    • 1
  1. 1.École Polytechnique Fédérale de LausanneSwitzerland

Personalised recommendations