Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis (Q1790086)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis |
scientific article; zbMATH DE number 6950834
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis |
scientific article; zbMATH DE number 6950834 |
Statements
Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis (English)
0 references
10 October 2018
0 references
Summary: At AES'00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES'00 (AES-256), respectively. Our attack result on Anubis is superior to known cryptanalytic result on it. In the cases of Crypton-192/256 and mCrypton-96/128, our attacks are applicable to 8-round reduced versions. The attack results on mCrypton-96/128 are more practical than known cryptanalytic results on them.
0 references