Abstract
We compare one round diffusion characteristics of the block cipher Spectr-H64 to those of AES-Rijndael and Safer K-64, in terms of the Avalanche Weight Distribution (AWD) criterion and observe a weakness in the round transformation of Spectr-H64. We exploit this weakness to break one round of Spectr-H64 extracting half of the key bits, and develop a chosen plaintext slide attack against the overall encryption algorithm, which works for 232 elements of the key space (out of 2256). We also observe 2128 weak keys, for which encryption becomes the same function as decryption, and 232 fixed points for each weak key.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
N. D. Goots, A. A. Moldovyan, and N. A. Moldovyan, Fast Encryption Algorithm Spectr-H64. In: V. I. Gorodetski, V. A. Skormin, L. J. Popyack (Eds.), Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security. Lecture Notes in Computer Science, Vol. 2052, pp. 275–286, Springer-Verlag, 2001.
Biryukov and D. Wagner, Slide Attacks. In: L. R. Knudsen (Ed.), Fast Software Encryption-FSE’99. Lecture Notes in Computer Science, Vol. 1636, pp. 245–259, Springer-Verlag, 1999.
Biryukov and D. Wagner, Advanced Slide Attacks. In: B. Preneel (Ed.), Advances in Cryptology-EUROCRYPT’2000. Lecture Notes in Computer Science, Vol. 1807, pp. 589–606, Springer-Verlag, 2000.
S. Murphy, The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts. Journal of Cryptography, Vol.2, No.3, pp.145–154, 1990.
Shamir and E. Biham, Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol.4, No.1, pp.3–72, 1991.
J. Daemen and V. Rijmen, The Design of Rijndael, AES-The Advanced Encryption Standard. Springer-Verlag, 2002.
J. L. Massey, Safer K-64: A Byte Oriented Block-Ciphering Algorithm. In: R. J. Anderson, Fast Software Encryption-FSE’93. Lecture Notes in Computer Science, Vol. 809, pp.1–17, Springer-Verlag, 1994.
S. Kavut, and M. D. Yücel, On Some Cryptographic Properties of Rijndael. In: V. I. Gorodetski, V. A. Skormin, L. J. Popyack (Eds.): Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security. Lecture Notes in Computer Science, Vol. 2052, pp. 300–311, Springer-Verlag, 2001.
E. Aras and M. D. Yücel, Performance Evaluation of Safer K-64 and S-Boxes of Safer Family. Turkish Journal of Electrical Engineering & Computer Sciences, Vol.9, No.2, pp. 161–175, 2001.
E. K. Grossman and B. Tuckerman, Analysis of a Weakened Feistel-like Cipher. Proc. International Conference on Communications, pp.46.3.1–46.3.5, Alger Press, 1978.
E. Biham, New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology, Vol.7, pp.229–246, 1994.
L. R. Knudsen, Cryptanalysis of LOKI91. In: J. Seberry and Y. Zheng (Eds.): Advances in Cryptology-ASIACRYPT’92. Lecture Notes in Computer Science, Vol. 718, pp.196–208, Springer-Verlag, 1993.
D. Coppersmith, The Real Reason for Rivest’s Phenomenon, Proc. CRYPTO’85, pp.535–536, Springer-Verlag, 1986.
J. H. Moore and G. J. Simmons, Cycle Structure of the DES with Weak and Semi-Weak Keys, Proc. CRYPTO’86, pp.9–32, Springer-Verlag, 1987.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kavut, S., Yücel, M.D. (2002). Slide Attack on Spectr-H64. In: Menezes, A., Sarkar, P. (eds) Progress in Cryptology — INDOCRYPT 2002. INDOCRYPT 2002. Lecture Notes in Computer Science, vol 2551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36231-2_4
Download citation
DOI: https://doi.org/10.1007/3-540-36231-2_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00263-5
Online ISBN: 978-3-540-36231-9
eBook Packages: Springer Book Archive