Improved DST Cryptanalysis of IDEA
نویسندگان
چکیده
In this paper, we show how the Demirci-Selcuk-Ture attack, which is currently the deepest penetrating attack on the IDEA block cipher, can be improved significantly in performance. The improvements presented reduce the attack’s plaintext, memory, precomputation time, and key search time complexities. These improvements also make a practical implementation of the attack on reduced versions of IDEA possible, enabling the first experimental verifications of the DST attack.
منابع مشابه
Developmental systems theory: what does it explain, and how does it explain it?
We examine developmental systems theory (DST) with two questions in mind: What does DST explain? How does DST explain it? To answer these questions, we start by reviewing major contributions to the origins of DST: the introduction of the idea of a "developmental system", the idea of probabilistic epigenesis, the attention to the role of information in the developmental system, and finally the e...
متن کاملBiclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity
In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...
متن کاملEvaluating Two Timezones and Daylight Saving Time for India
Recently, there has been considerable debate on redefining Indian Standard Time (IST). The suggestions include splitting the country into two timezones, while perhaps introducing daylight saving time (DST). We argue that the IST should remain unchanged. The arguments are centred around India’s geography, nation building and practical concerns. The most compelling reason offered in favour of a n...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملTruncated Diierentials of Idea
In 1991 Lai, Massey and Murphy introduced the IPES (Improved Proposed Encryption Standard), later renamed IDEA (International Data Encryption Algorithm). In this paper we analyse versions of IDEA with a reduced number of rounds. We consider diierential attacks using truncated diierentials, which can be used to cryptanalyse, at least in theory, up to 3.5 rounds of IDEA. The attack on 3.5 rounds ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006