Etsuko Tsujihara

Learn More
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007, including new 9-round impossible differentials for CLEFIA, and the result of an impossible differential attack using them. For the case of a 128-bit key, it is possible to apply the impossible differential attack to CLEFIA reduced to 12(More)
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007. It is known that there are the 9-round impossible differentials in CLEFIA. This paper presents the several results of impossible differential attacks using multiple impossible differentials. For key lengths of 128, 192 and 256 bits, it is(More)
A concrete attack using side channel information from cache memory behaviour was proposed for the first time at ISITA 2002. The attack uses the difference between execution times associated with S-box cache-hits and cache-misses to recover the intermediate key. Recently, a theoretical estimation of the number of messages needed for the attack was proposed(More)
This paper presents the results of three kinds of side-channel attacks, experimentally made against software-implemented ciphers on INSTAC-8 Compliant Board. INSTAC-8 is the standard evaluation platform, newly designed by the Information Technology Research and Standardization Center (INSTAC; a division of Japan Standards Association), to test Side-channel(More)
  • 1