Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2013, Article ID 713673, 10 pages
http://dx.doi.org/10.1155/2013/713673
Research Article

Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis

1Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea
2Department of Mathematics, University of Seoul, Jeonnong-dong, Dongdaemun-gu, Seoul 130-743, Republic of Korea

Received 19 July 2013; Accepted 22 August 2013

Academic Editor: Jongsung Kim

Copyright © 2013 Jinkeon Kang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Demirci and A. Selçuk, “A meet-in-the-middle attack on 8-round AES,” in Proceedings of the FSE, vol. 5086 of Lecture Notes in Computer Science, pp. 116–126, 2008.
  2. O. Dunkelman, G. Sekar, and B. Preneel, “Improved meet-in-the-middle attacks on reduced-round DES,” in Proceedings of the Indocrypt, vol. 4859 of Lecture Notes in Computer Science, pp. 86–100, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  3. H. Gilbert and M. Minier, “A collision attack on 7 rounds of Rijndael,” in Proceedings of the AES Candidate Conference, pp. 230–241, 2000.
  4. FIPS 197, “Advanced Encryption Standard (AES),” 2001, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
  5. C. Lim, “A revised version of crypton. Crypton Version 1.0,” in Proceedings of the FSE, vol. 1638 of Lecture Notes in Computer Science, pp. 31–45, 1999.
  6. C. Lim and T. Korkishko, “mCrypton—a lightweight block cipher for security of low-cost RFID tags and sensors,” in Proceedings of the WISA, vol. 3786 of Lecture Notes in Computer Science, pp. 243–258, 2006.
  7. P. Baretto and V. Rijmen, “The Anubis block cipher,” The NESSIE, 2000. View at Google Scholar
  8. J. Kim, S. Hong, S. Lee, J. H. Song, and H. Yang, “Truncated differential attacks on 8-round CRYPTON,” in Proceedings of the Information Security and Cryptology Conference (ICISC '03), vol. 2971 of Lecture Notes in Computer Science, pp. 446–456, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  9. H. Mala, M. Dakhilalian, and M. Shakiba, “Cryptanalysis of mCrypton—a lightweight block cipher for security of RFID tags and sensors,” International Journal of Communication Systems, vol. 25, no. 4, pp. 415–426, 2012. View at Google Scholar
  10. A. Biryukov and D. Khovratovich, “Related-key cryptanalysis of the full AES-192 and AES-256,” in Proceedings of the Asiacrypt, vol. 5912 of Lecture Notes in Computer Science, pp. 1–18, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  11. A. Biryukov, “Analysis of involutional ciphers: Khazad and Anubis,” in Proceedings of the FSE, vol. 2887 of Lecture Notes in Computer Science, pp. 45–53, 2003.