DOI QR코드

DOI QR Code

Saturation Attacks on the 27-round SKIPJACK

27라운드 SKIP JACK에 대한 포화 공격


Abstract

This paper describes saturation attacks on reduced-round versions of SKIPJACK. To begin with, we will show how to construct a 16-round distinguisher which distinguishes 16 rounds of SKIPJACK from a random permutation. The distinguisher is used to attack on 18(5~22) and 23(5~27) rounds of SKIPJACK. We can also construct a 20-around distinguisher based on the 16-round distinguisher. This distinguisher is used to attack on 22(1~22) and 27(1~27) rounds of SKIPJACK. The 80-bit user key of 27 rounds of SKIPJACK can be recovered with $2^{50}$ chosen plaintexts and 3\cdot 2^{75}$ encryption times.

본 논문에서는 포화 공격(saturation attack)을 SKIPJACK에 적응해 본다. 우리가 제시하는 포화 공격의 핵심은 SKIPJACK에 대한 16라운드 distinguisher의 구성 방법에 있으며 이것은 18라운드(5~22)와 23라운드(5~27) SKIPJACK에 대한 공격을 가능하게 한다. 또한 16라운드 distinguisher를 기반으로 하여 20라운드 distinguisher를 구성할 수 있는데 이것은 22라운드(1~22)와 27라운드(1~27) SKIPJACK에 대한 공격을 가능하게 한다. 27라운드 SKIPJACK에 대한 공격에 필요한 선택 평문은 $2^{50}$개이며 이 때의 공격 복잡도는 3\cdot 2^{75}$이다.

Keywords

References

  1. J.Stern,editor,Advances in Cryptology Eurocrypt'99.of Lecture Notes in Computer Science v.1592 Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials E.Biham;A.Biryukov;A.Shamir
  2. Initial Observations on the Skipjack Encryption Algorithm E.Biham;A.Biryukov;O.Dunkelmann;E.Richardson;A.Shamir
  3. Cryp-tanalysis of Skipjack-3XOR in 2 time andusing 2 chosen plaintexts E.Biham;A.Biryukov;O.Dunkelmann;E.Richardson;A.Shamir
  4. Cryptanalysis of Skipjack-4XOR E.Biham;A.Biryukov;O.Dundelmann;E.Richardson;A.Shamir
  5. Fast Software Encryption.Springer LNCS 1267 The block cipher SQUARE J.Daemin;L.Kundsen;V.Rijmen
  6. Advances in Cryptology,Proceedings Crypto'99,Springer.LNCS 1666 Truncated Differentials and Skipjack Lars R.Knudsen;M.J.B.Robshaw
  7. Fast Software Encryption Third International Workshop The saturation attack-a bait for Twofish S.Lucks
  8. AES Submission,AES Development effort Crypton:a new 128 bit bolck cipher C.H.Lim
  9. Fast Software Encryption Springer,LNCS 1636 A revised version of Crypton Crypton v.1.0 C.H.Lim
  10. AES Submission AES Development Effort AES proposal :Rijndael (2nd version) J.Daeme;V.Rijmen
  11. Fast Software Encryption.Springer LNCS 1978 Improved cryptanalys is of RIJNDAEL N.Ferguson;J.Kelsey;S.Lucks;B.Schneier;M.Stay;D.Wang;D.Whiting
  12. Fast Software Encryption Workshop 2001 LNCS1039 Flaws in differential Cryptanalysis of Skipjack Louis Granboulan
  13. Fast Software Encryption Springer LNCS 1636 Attakc on six round of Cryption V.Rijmen;B.Preneel;C.D'Hallui;G.Bijnens
  14. National Institute of Standards and Technology SKIPJACK and KEA algorithm specifications version2.0
  15. National Institute of Standards and Technology NSA Releases Fortezza Algorit hms