Abstract
This paper describes saturation attacks on reduced-round versions of Skipjack. To begin with, we will show how to construct a 16-round distinguisher which distinguishes 16 rounds of Skipjack from a random permutation. The distinguisher is used to attack on 18(5∼22) and 23(5∼27) rounds of Skipjack. We can also construct a 20-round distinguisher based on the 16-round distinguisher. This distinguisher is used to attack on 22(1∼22) and 27(1∼27) rounds of Skipjack. The 80-bit user key of 27 rounds of Skipjack can be recovered with 250 chosen plaintexts and 3 · 275 encryption times.
Chapter PDF
Similar content being viewed by others
References
E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson and A. Shamir, Initial Observations on the Skipjack Encryption Algorithm, June 25, 1998. Available at http://www.cs.technion.ac.il/~biham/Reports/Skipjack/.
E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson and A. Shamir, Cryptanalysis of Skipjack-3XOR in 220 time and using 29 chosen plaintexts, July 2, 1998. Available at http://www.cs.technion.ac.il/~biham/Reports/Skipjack/.
E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson and A. Shamir, Cryptanalysis of Skipjack-4XOR, June 30, 1998. Available at http://www.cs. technion.ac.il/~biham/Reports/Skipjack/.
E. Biham, A. Biryukov, and A. Shamir, Initial Observations on the Skipjack: Cryptanalysis of Skipjack-3XOR, SAC’98, 1998. Available at http://www.cs. technion.ac.il/~biham/Reports/Skipjack/.
Eli Biham, Alex Biryukov, and Adi Shamir, Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials, EUROCRYPT’99, LNCS 1592, Springer-Verlag, 1999 pp. 12–23. Available at http://www.cs.technion.ac.il/~biham/Reports/Skipjack/.
Lars R. Knudsen, M.J.B. Robshaw, and David Wagner, Truncated differentials and Skipjack, CRYPTO’99, LNCS 1666, Springer-Verlag, August 1999 pp. 165–180.
Louis Granboulan, Flaws in differential Cryptanalysis of Skipjack, Fast Software Encryption Workshop 2001, LNCS 1039, Springer-Verlag April, 2001, pp. 341–346.
S. Lucks, The Saturation Attack-a Bait for Twofish, Fast Software Encryption Workshop 2001, LNCS 1039, Springer-Verlag, 2001, pp. 189–203
National Institute of Standards and Technology, Skipjack and KEA Algorithm Specifications, version 2.0, Available at http://crsc.nist.gov/encryption/skipjack-kea.htm.
National Institute of Standards and Technology, NSA Releases Fortezza Algorithms, Available at http://crsc.nist.gov/encryption/encryption/nsa-press.pdf.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hwang, K., Lee, W., Lee, S., Lee, S., Lim, J. (2002). Saturation Attacks on Reduced Round Skipjack. In: Daemen, J., Rijmen, V. (eds) Fast Software Encryption. FSE 2002. Lecture Notes in Computer Science, vol 2365. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45661-9_8
Download citation
DOI: https://doi.org/10.1007/3-540-45661-9_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44009-3
Online ISBN: 978-3-540-45661-2
eBook Packages: Springer Book Archive