Skip to main content

On the strength of KASUMI without FL functions against Higher Order Differential Attack

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2000 (ICISC 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2015))

Included in the following conference series:

Abstract

The encryption algorithm KASUMI is referred to MISTY, proposed by Matsui, is a provably secure against Linear cryptoanalysis and Differential attack. We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI without FL functions. As the result, we can attack it using 2nd order differentials. This attack needs about 1,416 chosen plaintexts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. “KASUMI”, available at http://www.etsi.org/dvbandca/3GPP/3gppspecs.htm

  2. Matui, “Block Encryption Algorithm MISTY”, ISEC96-11(1996-07)

    Google Scholar 

  3. Shimoyama, Moriai, Kaneko, “Improving the Higher Order Di erential Attack and Cryptanalysis of the KN Cipher”, ISEC97-29(1997-09)

    Google Scholar 

  4. Moriai, Shimoyama, Kaneko, “Higher Order Attack of a CAST Cipher (II)”, SCIS98-12E

    Google Scholar 

  5. Jakobsen, Knudsen, “The Interpolation Attack on Block Cipher”, FSE-4th International Workshop, LNCS.1008

    Google Scholar 

  6. Nyberg, Knudsen, “Provable Security against Differential Cryptanalsis”, Jounal of Cryptology, Vol.8-no.1 (1995)

    Google Scholar 

  7. Shimoyama, Moriai, Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher”, 1997 Information Security Workshop

    Google Scholar 

  8. Matsui, “New Structure of Block Ciphers with Provable Security against Differential and Linear cryptanalysis”, FSE-3rd International Workshop, LNCS.1039

    Google Scholar 

  9. Moriai, Shimoyama, Kaneko, “Higher Order Attack of a CAST Cipher”, FSE-4th International Workshop, LNCS.1372

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tanaka, H., Ishii, C., Kaneko, T. (2001). On the strength of KASUMI without FL functions against Higher Order Differential Attack. In: Won, D. (eds) Information Security and Cryptology — ICISC 2000. ICISC 2000. Lecture Notes in Computer Science, vol 2015. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45247-8_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-45247-8_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41782-8

  • Online ISBN: 978-3-540-45247-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics