All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
From MaRDI portal
Publication:3455500
DOI10.1007/978-3-642-35999-6_14zbMath1327.94053OpenAlexW1513013279MaRDI QIDQ3455500
Takanori Isobe, Kyoji Shibutani
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_14
block ciphermeet-in-the-middle attackKATANkey scheduleSHACAL-2CAST-128all subkeys recovery attackblowfishFOX128
Related Items (10)
Optimum attack on 3-round Feistel-2 structure ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method ⋮ Quantum meet-in-the-middle attack on Feistel construction ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 ⋮ Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles ⋮ Improved Meet-in-the-Middle Distinguisher on Feistel Schemes ⋮ Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
Uses Software
Cites Work
- Parallel collision search with cryptanalytic applications
- Constructing symmetric ciphers using the CAST design procedure
- Narrow-Bicliques: Cryptanalysis of Full IDEA
- Three-Subset Meet-in-the-Middle Attack on Reduced XTEA
- Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo
- A Single-Key Attack on the Full GOST Block Cipher
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Biclique Cryptanalysis of the Full AES
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- Preimage Attacks on Reduced Tiger and SHA-2
- A New Class of Weak Keys for Blowfish
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256
- Preimages for Step-Reduced SHA-2
- On the weak keys of blowfish
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
This page was built for publication: All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach