DOI QR코드

DOI QR Code

Analysis for Weak Keys of the Block Cipher SEED-192

블록암호 SEED-192에 대한 취약키 분석

  • Kim, Jong-Sung (Division of e-Business, Kyungnam University) ;
  • Cho, Ki-Jo (Division of e-Business, Kyungnam University)
  • 김종성 (경남대학교 e-비즈니스학부) ;
  • 조기조 (경남대학교 e-비즈니스학부)
  • Received : 2011.01.20
  • Accepted : 2011.02.28
  • Published : 2011.02.28

Abstract

In this paper, we analyze the key schedule of the block cipher SEED-192. According to the result of this paper, there exist weak keys in 16 out of 20 rounds of SEED-192 against the related-key rectangle/boomerang attack. This is the first cryptanalytic result for the key schedule of SEED-192.

본 논문에서는 블록암호 SEED-192 키 스케줄 취약점을 분석한다. 본 연구 결과에 의하면, SEED-192는 전체 20 라운드 중 16 라운드에 대해, 연관키 렉탱글/부메랑 공격에 대한 취약키가 존재한다. 이는 SEED-192 키 스케줄에 대한 최초의 분석 결과이다.

Keywords

References

  1. 한국정보보호진흥원, "128비트 블록암호 알고리즘(SEED) 개발 및 분석 보고서", 2003.
  2. 한국정보보호진흥원, "블록암호 알고리즘 SEED-192/256 개발", 2008.
  3. E. Biham, "New Types of Cryptanalytic Attacks Using Related Keys", Journal of Cryptology, Vol. 7, No. 4, pp. 229-246, Springer-Verlag, 1994.
  4. E. Biham, O. Dunkelman and N. Keller, "Related-Key Boomerang and Rectangle Attacks", EUROCRYPT'05, LNCS 3494, pp. 507-525, Springer- Verlag, 2005.
  5. A. Biryukov, J. Nakahara J., B. Preneel, J. Vandewalle, "New Weak-Key Class of IDEA", ICICS'02, LNCS 2513, pp. 315-326, Springer-Verlag, 2002.
  6. J. Kim, S. Hong and B. Preneel, "Related-Key Rectangle Attacks on Reduced AES-192 and AES-256", FSE'07, LNCS 4593, pp. 225-241, Springer-Verlag, 2007.
  7. J. Kim, G. Kim, S. Hong, S. Lee and D. Hong, "The Related-Key Rectangle Attack - Application to SHACAL-1", ACISP'04, LNCS 3108, pp. 123-136, Springer-Verlag, 2004.
  8. E. Lee, J. Kim, D. Hong, C. Lee, J. Sung and S. Hong, "Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No. 2, pp. 642-649, 2008. https://doi.org/10.1093/ietfec/e91-a.2.642
  9. National Bureau of Standards, "Data Encryption Standard", Federal Information Processing Standards Publication 46, Jan. 1977.
  10. National Institue of Standards and Technology, "Advanced Encryption Standard", Federal Information Processing Standards Publications, No. 197, 2001.