Abstract
We present improved Square attacks against the NESSIE and ECTP candidate block ciphers Hierocrypt-3 and Hierocrypt-L1, designed by Toshiba. We improve over the previous best known attack on five S-box layers of Hierocrypt-3 by a factor of 2128 computational steps with an attack on six layers for 128-bit keys, and extend it to seven S-box layers for longer keys. For Hierocrypt-L1 we are able to improve previous attacks up to seven S-box layers (out of twelve).
F.W.O. Postdoctoral Researcher, sponsored by the Fund for Scientific Research -Flanders (Belgium)
sponsored in part by GOA project Mefisto 2000/06
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
J. Daemen, L.R. Knudsen, V. Rijmen, “The Block Cipher Square,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 149–165.
C. D’Halluin, G. Bijnens, V. Rijmen, B. Preneel, “Attack on Six Rounds of Crypton,” Fast Software Encryption, LNCS 1636, L. Knudsen, Ed., Springer-Verlag, 1999, pp. 46–59.
“Evaluation of Cryptographic Techniques Project,” http://www.ipa.go.jp/security/enc/CRYPTREC/index-e.html.
N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and D. Whiting, “Improved Cryptanalysis of Rijndael,” to appear in Fast Software Encryption’00, Springer-Verlag.
H. Gilbert, M. Minier, “A Collision Attack on Seven Rounds of Rijndael,” Third Advanced Encryption Standard Candidate Conference, NIST, April 2000, pp. 230–241.
S. Lucks, “The Saturation Attack-A Bait for Twofish, ” these Proceedings.
F.J. MacWilliams, N.J.A. Sloane, “The Theory of Error-Correcting Codes,” North-Holland Mathematical Library, vol. 16, 1977.
NESSIE Project — New European Schemes for Signatures, Integrity and Encryption — http://cryptonessie.org.
V. Rijmen, “Cryptanalysis and Design of Iterated Block Ciphers,” Doctoral Dissertation, October 1997, K.U.Leuven.
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, E. De Win, “The Cipher SHARK,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 99–112
Toshiba Corporation, “Security Evaluation: Hierocrypt-3,” September 25, 2000 — available at http://cryptonessie.org.
Toshiba Corporation, “Security Evaluation: Hierocrypt-L1,” September 25, 2000 — available at http://cryptonessie.org.
Toshiba Corporation, “Specification of Hierocrypt-3,” submitted to the First Open NESSIE Workshop, 13–14 November 2000, Leuven, Belgium — available at http://cryptonessie.org.
Toshiba Corporation, “Specification of Hierocrypt-L1,” submitted to the First Open NESSIE Workshop, 13–14 November 2000, Leuven, Belgium — available at http://cryptonessie.org.
Toshiba Corporation, “Specification on a Block Cipher: Hierocrypt-3,” Toshiba Corporation, Sep. 15, 2000 — submitted to the First Open NESSIE Workshop, 13-14 November 2000, Leuven, Belgium — available at http://cryptonessie.org.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Barreto, P.S.L.M., Rijmen, V., Nakahara, J., Preneel, B., Vandewalle, J., Kim, H.Y. (2002). Improved Square Attacks against Reduced-Round Hierocrypt . In: Matsui, M. (eds) Fast Software Encryption. FSE 2001. Lecture Notes in Computer Science, vol 2355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45473-X_14
Download citation
DOI: https://doi.org/10.1007/3-540-45473-X_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43869-4
Online ISBN: 978-3-540-45473-1
eBook Packages: Springer Book Archive