Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018 (2018), Article ID 7453572, 11 pages
https://doi.org/10.1155/2018/7453572
Research Article

Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192

Information Science and Technology Institute, Zhengzhou 450000, China

Correspondence should be addressed to Zi-Long Jiang; moc.621@rehpicard

Received 16 October 2017; Revised 28 December 2017; Accepted 4 January 2018; Published 14 March 2018

Academic Editor: Zhe Liu

Copyright © 2018 Zi-Long Jiang and Chen-Hui Jin. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. Biham, A. Biryukov, and A. Shamir, “Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials,” in Advances in Cryptology — EUROCRYPT ’99, vol. 1592 of Lecture Notes in Computer Science, pp. 12–23, Springer Berlin Heidelberg, Berlin, Heidelberg, 1999. View at Publisher · View at Google Scholar
  2. J. Lu, J. Kim, N. Keller et al., “Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1,” CT-RSA, vol. 4964, 2008. View at Google Scholar
  3. C. Boura, M. Naya-Plasencia, and V. Suder, “Scrutinizing and improving impossible differential attacks: Applications to CLEFIA, Camellia, LBlock and SIMON,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 8873, pp. 179–199, 2014. View at Google Scholar · View at Scopus
  4. X. Li, F.-W. Fu, and X. Guang, “Multiple impossible differential cryptanalysis on reduced FOX,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E98A, no. 3, pp. 906–911, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. D. Kwon, J. Kim, S. Park et al., “New Block Cipher: ARIA,” in Information Security and Cryptology - ICISC 2003, vol. 2971 of Lecture Notes in Computer Science, pp. 432–445, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004. View at Publisher · View at Google Scholar
  6. J. Daemen and V. Rijmen, The design of Rijndael: AES-the advanced encryption standard, Springer Science & Business Media, 2013.
  7. Y. Tsunoo, E. Tsujihara, M. Shigeri, T. Suzaki, and T. Kawabata, “Cryptanalysis of CLEFIA using multiple impossible differentials,” in Proceedings of the 2008 International Symposium on Information Theory and its Applications, ISITA2008, New Zealand, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. J. Lu, O. Dunkelman, N. Keller, and J. Kim, “New impossible differential attacks on AES,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 5365, pp. 279–293, 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Li, C.-H. Jin, and F.-W. Fu, “Improved results of impossible differential cryptanalysis on reduced FOX,” The Computer Journal, vol. 59, no. 4, pp. 541–548, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. W.-L. Wu, W.-T. Zhang, and D.-G. Feng, “Impossible differential cryptanalysis of reduced-round ARIA and Camellia,” Journal of Computer Science and Technology, vol. 22, no. 3, pp. 449–456, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. R. Li, B. Sun, P. Zhang et al., “New Impossible Differential Cryptanalysis of ARIA,” http://eprint.iacr.org/2008/227.pdf.
  12. L. Shenhua and S. Chunyan, “Improved impossible differential cryptanalysis of ARIA,” in Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008, pp. 129–132, Republic of Korea, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. C. Du and J. Chen, “Impossible differential cryptanalysis of ARIA reduced to 7 rounds,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 6467, pp. 20–30, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. Z.-M. Xie and S.-Z. Chen, “Impossible differential cryptanalysis of 7-round ARIR-192,” Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, vol. 35, no. 10, pp. 2301–2306, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. B. Sun, M. Liu, J. Guo, V. Rijmen, and R. Li, “Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 9665, pp. 196–213, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Li, W. Wu, and L. Zhang, “Integral attacks on reduced-round ARIA block cipher,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 6047, pp. 19–29, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. E. Fleischmann, C. Forler, M. Gorski, and S. Lucks, “New boomerang attacks on ARIA,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 6498, pp. 163–175, 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. X. Tang, B. Sun, R. Li, C. Li, and J. Yin, “A meet-in-the-middle attack on reduced-round ARIA,” The Journal of Systems and Software, vol. 84, no. 10, pp. 1685–1692, 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. Akshima, D. Chang, M. Ghosh, A. Goel, and S. K. Sanadhya, “Improved meet-in-the-middle attacks on 7 and 8-round ARIA-192 and ARIA-256,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 9462, pp. 198–217, 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. Q. Zhang, “Plaintext pair sieve methods in impossible differential attack,” Computer Engineering, vol. 2, p. 46, 2010. View at Google Scholar