A study on the structure of ARIA cipher is presented. A new 4-round distinguishing property for the meet-in-the-middle attack on ARIA cipher is presented by making use of the multiset and the truncated differential char-acteristic. The new distinguishing property improves the meet-in-the-middle attack on 7 rounds of ARIA-192 cipher ef-fectively by reducing the 30 parameters to 16. The new attack requires a precomputation complexity of 2
135.3
and a time complexity of about 2
123
.
关键词
Keywords
references
KWON D , KIM J . Specification of ARIA [EB/OL ] . http://www.nsri.re.kr/ARIA/doc/ARIA-specification-e.pdf http://www.nsri.re.kr/ARIA/doc/ARIA-specification-e.pdf . 2003 . 08 .
BIRYUKOV A , CANNIERE C , et al . Security and performance analysis of ARIA [EB/OL ] . http://cloud.ttongfly.net/t/attachment/1321529635.pdf http://cloud.ttongfly.net/t/attachment/1321529635.pdf . 2004 . 07 .
WU W , ZHANG W , FENG D . Impossible differential cryptanalysis of reduced-round ARIA and Camellia [J ] . Journal of Computer Science and Technology , 2007 , 22 ( 3 ): 449 - 456 .
LI S , SONG C . Improved impossible differential cryptanalysis of ARIA [A ] . ISA 2008, IEEE Computer Society [C ] . Los Alamitos , 2008 . 129 - 132 .
FLEISCHMANN E , GORSKI M , LUCKS S . Attacking reduced rounds of the ARIA block cipher [EB/OL ] . http://eprint.iacr.org/2009/334.pdf http://eprint.iacr.org/2009/334.pdf . 2009 . 07 .
LI Y , WU W , ZHANG L . Integral attacks on reduced-round ARIA block cipher [A ] . ISPEC 2010 [C ] . 2010 . 19 - 29 .
DU C , CHEN J . Impossible differential cryptanalysis of ARIA reduced to 7 rounds [A ] . CANS 2010 [C ] . 2010 . 20 - 30 .
TANG X , SUN B , LI R . A meet-in-the-middle attack on re-duced-round ARIA [J ] . Journal of Systems and Software , 2011 , 84 ( 10 ): 1685 - 1692 .
SU C M . New impossiblediferential attack on 7-round reduced ARIA [J ] . Journal of Computer Applications , 2012 , 32 ( 1 ): 45 - 48 .
ZHANG W , LIU F , LIU X , MENG S . Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32 [J ] . Journal of Shanghai Jiaotong University ( Science ), 2013 , 18 ( 2 ): 147 - 152 .
LU J , WEI Y . The higher-order meet-in-the-middle attack and its application to the camellia block cipher [A ] . INDOCRYPT 2012 [C ] . 2012 . 244 - 264 .
LU J , WEI Y . Meet-in-the-middle attack on reduced versions of the camellia block cipher [A ] . IWSEC 2012 [C ] . 2012 . 197 - 215 .
DUNKELMAN O , KELLER N , SHAMIR A . Improved single-key attacks on 8-round AES [A ] . ASIACRYPT 2010 [C ] . 2010 . 158 - 176 .
JOHANSSON T , NGUYEN P . Improved key recovery attacks on reduced-round AES in the single-key setting [A ] . EUROCRYPT 2013 [C ] . 2013 . 371 - 387 .
DU C , CHEN J . Improved meet-in-the-middle attacks on ARIA [A ] . ISAI 2010 [C ] . 2010 . 306 - 310 .