Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST

@inproceedings{Ko2004RelatedKD,
  title={Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST},
  author={Youngdai Ko and Seokhie Hong and W. Lee and S. Lee and Ju-Sung Kang},
  booktitle={FSE},
  year={2004}
}
  • Youngdai Ko, Seokhie Hong, +2 authors Ju-Sung Kang
  • Published in FSE 2004
  • Mathematics, Computer Science
  • In this paper, we present a related key truncated differential attack on 27 rounds of XTEA which is the best known attack so far. [...] Key Method First, we present a distinguishing attack on full-round GOST, which can distinguish it from a random permutation with probability 1 - 2 -64 using a related key differential characteristic. We also show that H. Seki et al.'s idea combined with our related key differential characteristic can be applied to attack 31 rounds of GOST .Expand Abstract
    100 Citations
    Reflection Cryptanalysis of Some Ciphers
    • Orhun Kara
    • Mathematics, Computer Science
    • INDOCRYPT
    • 2008
    • 39
    A Single-Key Attack on the Full GOST Block Cipher
    • T. Isobe
    • Computer Science
    • Journal of Cryptology
    • 2012
    • 38
    • PDF
    Related-Key Rectangle Attack on 43-Round SHACAL-2
    • G. Wang
    • Mathematics, Computer Science
    • ISPEC
    • 2007
    • 13
    Three-Subset Meet-in-the-Middle Attack on Reduced XTEA
    • 12
    The Delicate Issues of Addition with Respect to XOR Differences
    • 15
    • PDF
    Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
    • 8
    • PDF
    Improved Slide Attacks
    • 36
    • PDF
    A Single-Key Attack on the Full GOST Block Cipher
    • 68
    • PDF
    Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
    • 98
    • PDF

    References

    SHOWING 1-10 OF 21 REFERENCES
    Related-Key Boomerang and Rectangle Attacks
    • 220
    • PDF
    Key-Schedule Cryptanalysis of DEAL
    • 63
    • PDF
    New types of cryptanalytic attacks using related keys
    • E. Biham
    • Mathematics, Computer Science
    • Journal of Cryptology
    • 2004
    • 461
    Differential Cryptanalysis of Reduced Rounds of GOST
    • 49
    • PDF
    Differential Cryptanalysis of TEA and XTEA
    • 41
    Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
    • 240
    • Highly Influential
    • PDF
    The Boomerang Attack
    • 515
    • PDF