Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
@inproceedings{Ko2004RelatedKD, title={Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST}, author={Youngdai Ko and Seokhie Hong and W. Lee and S. Lee and Ju-Sung Kang}, booktitle={FSE}, year={2004} }
In this paper, we present a related key truncated differential attack on 27 rounds of XTEA which is the best known attack so far. [...] Key Method First, we present a distinguishing attack on full-round GOST, which can distinguish it from a random permutation with probability 1 - 2 -64 using a related key differential characteristic. We also show that H. Seki et al.'s idea combined with our related key differential characteristic can be applied to attack 31 rounds of GOST .Expand Abstract
Figures, Tables, and Topics from this paper
100 Citations
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA
- Mathematics, Computer Science
- AFRICACRYPT
- 2012
- 12
The Delicate Issues of Addition with Respect to XOR Differences
- Mathematics, Computer Science
- Selected Areas in Cryptography
- 2007
- 15
- PDF
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2006
- 8
- PDF
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Mathematics, Computer Science
- FSE
- 2007
- 98
- PDF
References
SHOWING 1-10 OF 21 REFERENCES
New types of cryptanalytic attacks using related keys
- Mathematics, Computer Science
- Journal of Cryptology
- 2004
- 461
Differential Cryptanalysis of Reduced Rounds of GOST
- Computer Science
- Selected Areas in Cryptography
- 2000
- 49
- PDF
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
- Computer Science
- ICICS
- 1997
- 240
- Highly Influential
- PDF