Advanced Search
Volume 32 Issue 10
Dec.  2010
Turn off MathJax
Article Contents
Tang Xue-Hai, Li Chao, Wang Mei-Yi, Qu Long-Jiang. Impossible Differential Attack on 3D Cipher[J]. Journal of Electronics & Information Technology, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J.1146.2009.01375
Citation: Tang Xue-Hai, Li Chao, Wang Mei-Yi, Qu Long-Jiang. Impossible Differential Attack on 3D Cipher[J]. Journal of Electronics & Information Technology, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J.1146.2009.01375

Impossible Differential Attack on 3D Cipher

doi: 10.3724/SP.J.1146.2009.01375
  • Received Date: 2009-10-26
  • Rev Recd Date: 2010-03-15
  • Publish Date: 2010-10-19
  • 3D cipher is a new block cipher proposed in CANS2008. It is different from all known block cipher as it uses the three dimension structure. The designers give out a 5-round impossible differential and make an impossible differential attack on 6-round 3D cipher. In this paper, some new 6-round impossible differentials are found according to its structure properties. Based on these new impossible differentials and the equivalent structure of 3D cipher, effective impossible differential attacks can be made on 7 and 8-round 3D cipher. Moreover, according to some properties of the key schedule, these attacks can be extended to 9-round 3D cipher. These attack results are better than the designers.
  • loading
  • Nakahara J Jr. 3D: A three-dimensional block cipher[C]. CANS 2008, Springer-Verlag, 2008, LNCS 5339: 252-267.[2]Biham E, Biryukov A, and Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]. EUROCRYPT'99, Springer-Verlag, 1999, LNCS 1592: 12-23.[3]Nakahara J Jr and Ivan Carlos Pavao. Impossible-differential attacks on large-block rijndael[C]. ISC 2007, Springer-Verlag, 2007, LNCS 4779: 104-117.[4]Zhang Wen-tao, Wu Wen-ling, and Feng Deng-guo. New results on impossible differential cryptanalysis of reduced AES[C]. ICISC 2007, Springer-Verlag, 2007, LNCS 4817: 239-250.[5]Wu Wen-ling, Zhang Wen-tao, and Feng Deng-guo. Impossible differential cryptanalysis of reduced-round ARIA and camellia[J].Journal of Computer Science and Technology.2007, 22(3):449-456[6]Lu Ji-qiang and Kim J, et al.. Improving the efficiency of impossible differential cryptanalysis of reduced camellia and MISTY1[C]. CT-RSA 2008, Springer-Verlag, 2008, LNCS 4964: 370-386.[7]Tsunoo Y, Tsujihara E, and Shigeri M, et al.. Impossible differential cryptanalysis of CLEFIA[C]. FSE 2008, Springer-Verlag, 2008, LNCS 5086: 398-411[8]Wang Wei and Wang Xiao-yun. Impossible differential cryptanalysis of CLEFIA-128/192/256[J].Journal of Software.2009, 20(9):2587-2596[9]Zhang Wen-ying and Han Jing. Impossible differential cryptanalysis of reduced round CLEFIA[C], Inscrypt 2008, Springer-Verlag, 2009, LNCS 5487: 181-191.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (4053) PDF downloads(919) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return