Abstract
The cipher family SPEED (and an associated hashing mode) was recently proposed in Financial Cryptography ’97. This paper cryptanalyzes that proposal, in two parts: First, we discuss several troubling potential weaknesses in the cipher. Next, we show how to efficiently break the SPEED hashing mode using differential related-key techniques, and propose a differential attack on 48-round SPEED. These results raise some significant questions about the security of the SPEED design.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E. Biham, “New Types of Cryptanalytic Attacks Using Related Keys,” Journal of Cryptology, v. 7, n. 4 (1994), pp. 229–246.
A. Biryukov and E Kushilevitz, “Improved cryptanalysis of RC5,” Advances in Cryptology, Proc. Eurocrypt’97, LNCS, to appear.
J. Kelsey, B. Schneier, and D. Wagner, “Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES,” Advances in Cryptology— CRYPTO’ 96, Springer-Verlag, 1996, pp. 237–251.
L.R. Knudsen, V. Rijmen, R.L. Rivest and M.J.B. Robshaw, “On the design and security of RC2,” Fast Software Encryption, LNCS 1372, S. Vaudenay, Ed., Springer-Verlag, 1998, pp. 206–221.
X. Lai, J.L. Massey, and S. Murphy, “Markov ciphers and differential cryptanalysis,” Advances in Cryptology, Proc. Eurocrypt’91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1992, pp. 17–38.
B. Preneel, V. Rijmen, and A. Bosselaers, “Recent developments in the design of conventional cryptographic algorithms,” Computer Security and Industrial Cryptography-State of the Art and Evolution, LNCS, Springer-Verlag, to appear.
V. Rijmen, B. Preneel, E. De Win, “On weaknesses of non-surjective round functions,” Designs, Codes, and Cryptography, Vol. 12, No. 3, November 1997, pp. 253–266.
R.L. Rivest, “The RC5 encryption algorithm,” Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 86–96.
B. Schneier, J. Kelsey, “Unbalanced Feistel Networks and Block Cipher Design,” Fast Software Encryption-Third International Workshop, Springer-Verlag, 1996.
B. Schneier, D. Whiting, “Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor,” Fast Software EncryptionFourth International Workshop, Springer-Verlag, 1997.
R. Winternitz and M. Hellman, “Chosen-key Attacks on a Block Cipher,” Cryptologia, v. 11, n. 1, Jan 1987, pp. 16–20.
Y. Zheng, “The SPEED Cipher,” in Proceedings of Financial Cryptography’ 97, Springer-Verlag.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hall, C., Kelsey, J., Rijmen, V., Schneier, B., Wagner, D. (1999). Cryptanalysis of SPEED. In: Tavares, S., Meijer, H. (eds) Selected Areas in Cryptography. SAC 1998. Lecture Notes in Computer Science, vol 1556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48892-8_25
Download citation
DOI: https://doi.org/10.1007/3-540-48892-8_25
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65894-8
Online ISBN: 978-3-540-48892-7
eBook Packages: Springer Book Archive