|
This article is cited in 12 scientific papers (total in 12 papers)
An attack on $\mathrm{6}$ rounds of Khazad
D. A. Burova, B. A. Pogorelovb a TVP Laboratories, Moscow
b Academy of Cryptography of the Russian Federation, Moscow
Abstract:
We suggest new attacks on the $64$-bit block cipher Khazad. These attacks use some structural properties of its round function. As a result we find $14$ new classes of weak keys for $5$ and $6$ rounds of Khazad. Particularly we show that Khazad has $7$ classes of weak keys for $5$ and $6$ rounds such that the cardinality of each class is $2^{64}$. The time complexity of weak keys recovering is $2^{35}$ $\mathrm{S}$-box lookups for $5$ rounds and $2^{43}$ $\mathrm{S}$-box lookups for $6$ rounds. The corresponding data complexity is $2^{32}$ chosen plaintexts.
Key words:
block cipher, Khazad, invariant subspaces, reducible linear transformation.
Received 02.III.2015
Citation:
D. A. Burov, B. A. Pogorelov, “An attack on $\mathrm{6}$ rounds of Khazad”, Mat. Vopr. Kriptogr., 7:2 (2016), 35–46
Linking options:
https://www.mathnet.ru/eng/mvk181https://doi.org/10.4213/mvk181 https://www.mathnet.ru/eng/mvk/v7/i2/p35
|
Statistics & downloads: |
Abstract page: | 878 | Full-text PDF : | 334 | References: | 71 | First page: | 3 |
|