IRong-jia L, INChen-hui J. Meet-in-the-middle attacks on FOX block cipher[J]. Journal on Communications, 2016, 37(8): 185-190.
DOI:
IRong-jia L, INChen-hui J. Meet-in-the-middle attacks on FOX block cipher[J]. Journal on Communications, 2016, 37(8): 185-190. DOI: 10.11959/j.issn.1000-436x.2016168.
The security of the block cipher FOX against meet-in-the-middle attack was analyzed.Firstly
3-round meet-in-the-middle distinguishers was constructed and 6-round meet-in-the-middle attacks for FOX64 and FOX128 was proposed.The two attacks were beter attacks for 6-round FOX64 and FOX128
respectively.Secondly
the meet-in-the-middle distinguisher was extended of FOX128 to 4 rounds and proposed 7-round meet-in-the-middle attack combined with time/memory/data tradeoff.Compared to the currently known attacks on 7-round FOX128
The attack has a greater time and memory complexity
however the data complexity is much smaller.
关键词
Keywords
references
JUNOD P , VAUDENAY S , SHACHAM H . FOX:a new family of block ciphers [C ] // Lecture Notes in Computer Science,2004 . c 2004 : 131 - 146 .
WU W , ZHANG W , FENG D . cryptanalysis of reduced FOX block cipher [J ] . Lecture Notes in Computer Science , 2005 , 3935 ( 1 ): 229 - 241 .
WU Z M , LAI X J , ZHU B , et al . Impossible differential cryptanalysis of FOX [EB/OL ] . IACR Cryptology ePrint Archive , 2009 .
CHEN J , HU Y P , ZHANG Y Y , et al . Differential collision attack on re-duced fox block cipher [J ] . China Communications , 2012 , 9 ( 7 ): 71 - 76 .
YI W T , CHEN S Z . Multidimensional zero-correlation linear attacks on Fox block cipher [J ] . Journal of Cryptologic Research , 2015 , 2 ( 1 ): 27 - 39 .
ISOBE T , SHIBUTANI K . Improved all-subkeys recovery attacks on FOX,KATAN and SHACAL-2 block ciphers [C ] // FSE 2014 . c 2014 : 104 - 126 .
DEMIRCI H , SELÇUK A . A Meet-in-the-middle attack on 8-round AES [C ] // Lecture Motes in Computer Science . Lausanne,Switzerland c 2008 : 116 - 126 .
DUNKELMAN O , KELLER N , SHAMIR A . Improved single-key attacks on 8-round AES-192 and AES-256 [J ] . Journal of Cryptology , 2010 , 28 ( 3 ): 158 - 176 .
DERBEZ P , FOUQUE P A , JEAN J . Improved key recovery attacks on reduced-round AES in the single-key setting [J ] . Lecture Notes in Computer Science , 2013 , 788 : 371 - 387 .
LI L B , JIA K T , WANG X Y . Improved single-key attacks on 9-round AES-192/256 [M ] // Fast Software Encryption . Springer Berlin Heidel-berg c 2014 : 127 - 146 .