Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis

At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) a...

Full description

Bibliographic Details
Main Authors: Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee
Format: Article
Language:English
Published: Hindawi Limited 2013-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2013/713673
id doaj-69780b604d2e41e0adbcd9093ce8a893
record_format Article
spelling doaj-69780b604d2e41e0adbcd9093ce8a8932020-11-24T23:59:34ZengHindawi LimitedJournal of Applied Mathematics1110-757X1687-00422013-01-01201310.1155/2013/713673713673Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and AnubisJinkeon Kang0Kitae Jeong1Jaechul Sung2Seokhie Hong3Kyungho Lee4Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaCenter for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaDepartment of Mathematics, University of Seoul, Jeonnong-dong, Dongdaemun-gu, Seoul 130-743, Republic of KoreaCenter for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaCenter for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaAt AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES’00 (AES-256), respectively. Our attack result on Anubis is superior to known cryptanalytic result on it. In the cases of Crypton-192/256 and mCrypton-96/128, our attacks are applicable to 8-round reduced versions. The attack results on mCrypton-96/128 are more practical than known cryptanalytic results on them.http://dx.doi.org/10.1155/2013/713673
collection DOAJ
language English
format Article
sources DOAJ
author Jinkeon Kang
Kitae Jeong
Jaechul Sung
Seokhie Hong
Kyungho Lee
spellingShingle Jinkeon Kang
Kitae Jeong
Jaechul Sung
Seokhie Hong
Kyungho Lee
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Journal of Applied Mathematics
author_facet Jinkeon Kang
Kitae Jeong
Jaechul Sung
Seokhie Hong
Kyungho Lee
author_sort Jinkeon Kang
title Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
title_short Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
title_full Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
title_fullStr Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
title_full_unstemmed Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
title_sort collision attacks on aes-192/256, crypton-192/256, mcrypton-96/128, and anubis
publisher Hindawi Limited
series Journal of Applied Mathematics
issn 1110-757X
1687-0042
publishDate 2013-01-01
description At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES’00 (AES-256), respectively. Our attack result on Anubis is superior to known cryptanalytic result on it. In the cases of Crypton-192/256 and mCrypton-96/128, our attacks are applicable to 8-round reduced versions. The attack results on mCrypton-96/128 are more practical than known cryptanalytic results on them.
url http://dx.doi.org/10.1155/2013/713673
work_keys_str_mv AT jinkeonkang collisionattacksonaes192256crypton192256mcrypton96128andanubis
AT kitaejeong collisionattacksonaes192256crypton192256mcrypton96128andanubis
AT jaechulsung collisionattacksonaes192256crypton192256mcrypton96128andanubis
AT seokhiehong collisionattacksonaes192256crypton192256mcrypton96128andanubis
AT kyungholee collisionattacksonaes192256crypton192256mcrypton96128andanubis
_version_ 1725447377042538496