Advertisement

Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis

  • Changhoon Lee
  • Jongsung Kim
  • Jaechul Sung
  • Seokhie Hong
  • Sangjin Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3982)

Abstract

In this paper we introduce two new block cipher structures, named RC6-like structure and MISTY-FO-like structure, and show that these structures are provably resistant against differential attack. The main results of this paper are that the 5-round differential probabilities of these structures are upperbounded by p 4+2p 5 and p 4, respectively, if the maximum differential probability of a round function is p. We also discuss a provable security for the RC6-like structure against LC. Our results are attained under the assumption that all of components in our proposed structures are bijective.

Keywords

Provable Security Differential Cryptanalysis Linear Cryptanalysis RC6 MISTY Feistel Network 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aoki, K., Ohta, K.: Strict Evaluation of the Maximum Average of Differential Probability and the Maximem Average of Linear Probability. IEICE Transcations fundamentals of Elections, Communications and Computer Sciences (1), 2–8 (1997)Google Scholar
  2. 2.
    Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)Google Scholar
  3. 3.
    Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)Google Scholar
  4. 4.
    Daemen, J., Rijndael, V.: The Rijndael block cipher. AES proposal (1998)Google Scholar
  5. 5.
    Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D., Cho, I.: Provable security against differential and linear cryptanalysis for the SPN structure. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 273–283. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Hong, S., Sung, J., Lee, S., Lim, J., Kim, J.: Provable Security for 13 round Skipjack-like Structure. Information Processing Letters (2001)Google Scholar
  7. 7.
    Kanda, M., Takashima, Y., Matsumoto, T., Aoki, K., Ohta, K.: A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 264–279. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  8. 8.
    Lee, C., Kim, J., Sung, J., Hong, S., Lee, S.: Provable Security for an RC6-like Structure and a MISTY-FO-like Structure against Differential Cryptanalysis-Full Version Available at http://homes.esat.kuleuven.be/kjongsun/publication.html (or)http://cist.korea.ac.kr/new/Publication/index.html.
  9. 9.
    Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)Google Scholar
  10. 10.
    Matsui, M.: New structure of block ciphers with provable security against differential and linear cryptanalysis. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, Springer, Heidelberg (1996)Google Scholar
  11. 11.
    Nyberg, K., Knudsen, L.R.: Provable security against differential cryptanalysis. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 566–574. Springer, Heidelberg (1993)Google Scholar
  12. 12.
    Nyberg, K.: Generalized Feistel Networks. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 91–104. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  13. 13.
    Nyberg, K.: Linear approximation of block ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 439–444. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  14. 14.
    Rivest, R., Robshaw, M., Sidney, R., Yin, Y.L.: The RC6 Block Cipher, http://theory.lcs.mit.edu/rivest/rc6.pdf
  15. 15.
    Sung, J., Lee, S., Lim, J., Hong, S., Park, S.: Provable security for the skipjack-like structure against differential cryptanalysis and linear cryptanalysis. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 274–288. Springer, Heidelberg (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Changhoon Lee
    • 1
  • Jongsung Kim
    • 1
    • 2
  • Jaechul Sung
    • 3
  • Seokhie Hong
    • 1
  • Sangjin Lee
    • 1
  1. 1.Center for Information Security Technologies(CIST)Korea UniversitySeoulKorea
  2. 2.ESAT/SCD-COSICKatholieke Universiteit LeuvenBelgium
  3. 3.Department of MathematicsUniversity of SeoulSeoulKorea

Personalised recommendations