Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI

@article{Yi2014MultidimensionalZL,
  title={Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI},
  author={Wentan Yi and Shaozhen Chen},
  journal={IET Inf. Secur.},
  year={2014},
  volume={10},
  pages={215-221}
}
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001. There are a great deal of cryptanalytic results on KASUMI, however, its security evaluation against the recent zero-correlation linear attacks is still lacking so far. In this paper, we select some special input masks to refine the general 5-round zero-correlation linear approximations… 

Figures and Tables from this paper

Multidimensional Zero-Correlation Linear Attacks on Reduced-Round MISTY1

This paper first investigates the properties of the FL linear function and identifies some subkey-based linear approximations with zero-correlation over 5 rounds of MISTY1, and proposes the zero-Correlation linear attacks on 6-round MISTy1 with 4 FL layers as well as 7-rounder with 4FL layers.

Integral Cryptanalysis of Reduced-round KASUMI

This paper shows that 7-round KASUMI is attackable with 263 data complexity and 263.3 encryptions under the weak key conditions and finds new 4.5-round characteristics of KASumI for the first time.

Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack

In this paper, modifications in the original KASUMI block cipher is proposed by introducing a finite-state machine (FSM) and substitution box (Sbox) to provide better confidentiality and integrity

An Approach of Zero Correlation Linear Cryptanalysis

The method used by ZCLC is explained and the block ciphers which have been attacked by Z CLC and multidimensional ZCLc have been stated and the links between IDC and ZCLP have been projected.

A novel modified KASUMI block chiper for global system for mobile communications

The modifications in traditional KASUMI are proposed by introducing Rijndaels’s S-box which is present in the SNOW-3G block chiper and the FI function is removed completely and the modification in the FO function is suggested.

To Cryptanalyse PRESENT Lightweight Block Cipher using Zero Correlation Linear Cryptanalysis

The need of lightweight block cipher has been discussed and what all primitives are required to maintain balance between security, size, cost and other factors are illustrated and a Zero correlation linear cryptanalytic technique can be applied to PRESENT Lightweight Block Cipher.

Implementation of Chaos Based Cryptography in Kasumi Block Cipher

In this proposed work new cryptosystem is proposed based on the combination of Lorenz equations of chaos theory and KASUMI block cipher and random numbers are generated based on chaos theory using Lorenz equation to give best randomness resulting in improved performance in cryptos system.

New insights on linear cryptanalysis

This work investigates the correlation distribution of differential-linear hull over random permutation and derives a concrete and concise correlation distribution accordingly, which could make differential- linear cryptanalysis more reasonable and precise.

Reducing the time required by KASUMI to generate output by modifying the FL and FI functions

The modifications in existing KASUMI block cipher are proposed, which can reduce time delay for generating 64-bit encrypted data and the performance improvement of the proposed algorithm over the conventional algorithm is verified by simulation results.

References

SHOWING 1-10 OF 18 REFERENCES

Improved Cryptanalysis of the Block Cipher KASUMI

This paper proposes the first 7-round attack on KASUMI with time and data complexities similar to the previously best 6-round attacks, which leaves now only a single round of security margin.

A Related-Key Rectangle Attack on the Full KASUMI

The results show that theoretically, KASUMI is not secure with respect to differential-based related-key attacks, and thus, the security of the entire encryption system of the 3GPP networks cannot be proven at this time.

Zero Correlation Linear Cryptanalysis with Reduced Data Complexity

The findings of this paper demonstrate that the prohibitive data complexity requirements are not inherent in the zero correlationlinear cryptanalysis and can be overcome and suggest that zero correlation linear cryptanalysis can actually break more rounds than the best known impossible differential cryptanalysis does for relevant block ciphers.

Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA

The FFT Fast Fourier Transform technique is used to speed up the zero-correlation cryptanalysis of block ciphers and improves upon the state-of-the-art cryptanalysis for the ISO/IEC standard and CRYPTREC-portfolio cipher Camellia.

Linear hulls with correlation zero and linear cryptanalysis of block ciphers

This work introduces a novel extension of linear crypt analysis: zero-correlation linear cryptanalysis, a technique applicable to many block cipher constructions based on linear approximations with a correlation value of exactly zero.

Multidimensional Zero-Correlation Linear Cryptanalysis of E2

E2 is a block cipher designed by NTT and was a first-round AES candidate, and it has been shown how to improve upon the impossible differential cryptanalysis of Camellia with the zero-correlation linear cryptanalysis.

New Block Encryption Algorithm MISTY

  • M. Matsui
  • Computer Science, Mathematics
    FSE
  • 1997
The software implementation of MISTY1 with eight rounds can encrypt a data stream in CBC mode at a speed of 20Mbps and 40Mbps on Pentium/100MHz and PA-7200/120MHz, respectively.

Cryptanalysis of Reduced-Round MISTY

This paper presents attacks on reduced-round variants of both MISTy1 and MISTY2, without as well as with the key-dependent linear functions FL.

Related Key Attacks on Reduced Round KASUMI

This paper describes related key attacks on five and six round KASUMI, and recovers the entire key in a maximum of 2 112 trials.