Advertisement

Integral Cryptanalysis of Reduced FOX Block Cipher

  • Wenling Wu
  • Wentao Zhang
  • Dengguo Feng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3935)

Abstract

FOX is a family of block ciphers presented recently, which is based upon some results of provable security and has high performances on various platforms. In this paper, we construct some distinguishers between 3-round FOX and a random permutation of the blocks space. By using integral attack and collision-searching techniques, the distinguishers are used to attack 4, 5, 6 and 7-round FOX64, 4 and 5-round FOX128. The attack is more efficient than previous integral attacks on FOX. The complexity of improved integral attack is 277.6 on 4-round FOX128, 2205.6 against 5-round FOX128 respectively. For FOX64, the complexity of improved integral attack is 245.4 on 4-round FOX64, 2109.4 against 5-round FOX64, 2173.4 against 6-round FOX64, 2237.4 against 7-round FOX64 respectively. Therefore, 4-round FOX64/64, 5-round FOX64/128, 6-round FOX64/192, 7-round FOX64/256 and 5-round FOX128/256 are not immune to the attack in this paper.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Biham, E., Biryukov, A., Shamir, A.: Enhancing differential-linear cryptanalysis. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 254–266. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Biham, E., Dunkelman, O., Keller, N.: The rectangle attack - rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 340–357. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12–23. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  4. 4.
    Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245–259. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  5. 5.
    Biryukov, A., Wagner, D.: Advanced slide attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589–606. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  6. 6.
    Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267–287. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Harpes, C., Massey, J.: Partitioning cryptanalysis. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 13–27. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  8. 8.
    Hu, Y., Zhang, Y., Xiao, G.: Integral cryptanalysis of SAFER++. Electronics Letters 35(17), 1458–1459Google Scholar
  9. 9.
    Junod, P., Vaudenay, S.: FOX: a new family of block ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 114–129. Springer, Heidelberg (2004), http://crypto.junod.info CrossRefGoogle Scholar
  10. 10.
    Junod, P., Vaudenay, S.: Perfect diffusion primitives for block ciphers—building efficient MDS matrices. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 84–99. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Jakobsen, T., Knudsen, L.: The interpolation attack against block ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28–40. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  12. 12.
    Knudsen, L.: Truncated and higher order differentials. In: Fast Software Encryption-FSE 1995. LNCS, vol. 2595, pp. 196–211. Springer, Heidelberg (1995)Google Scholar
  13. 13.
    Knudsen, L., Wagner, D.: Integral cryptanalysis (extended abstract). In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 112–127. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  14. 14.
    Lai, X., Massey, J.: A proposal for a new block encryption standard. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 389–404. Springer, Heidelberg (1991)CrossRefGoogle Scholar
  15. 15.
    Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17(2), 373–386Google Scholar
  16. 16.
    Lanford, K., Hellman, E.: Differential-linear cryptanalysis. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 17–25. Springer, Heidelberg (1994)Google Scholar
  17. 17.
    Minier, M.: An integral cryptanalysis against a five rounds version of FOX. In: Western European Workshop on Research in Cryptography-WEWoRC, July 5-7, Leuven, Belgium (2005)Google Scholar
  18. 18.
    Murphy, S., Robshaw, M.: Comments on the security of the AES and the XSL technique. Electronic Letters 39(1), 36–38Google Scholar
  19. 19.
    Vaudenay, S.: On the Lai-Massey scheme. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 8–19. Springer, Heidelberg (1999)Google Scholar
  20. 20.
    Wagner, D.: The boomerang attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 157–170. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  21. 21.
    Wu, H.: Related-cipher attacks. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 447–455. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  22. 22.
    Wu, W., Feng, D., Chen, H.: Collision attack and pseudorandomness of reduced-round Camellia. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 256–270. Springer, Heidelberg (2005)Google Scholar
  23. 23.
    Yeom, Y., Park, S., Kim, I.: On the security of Camellia against the square attack. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 89–99. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Wenling Wu
    • 1
  • Wentao Zhang
    • 2
  • Dengguo Feng
    • 1
  1. 1.State Key Laboratory of Information SecurityInstitute of Software, Chinese Academy of SciencesBeijingP.R. China
  2. 2.State Key Laboratory of Information SecurityGraduate University of Chinese Academy of SciencesBeijingP.R. China

Personalised recommendations