Saturation attacks on reduced round Skipjack

Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

This paper describes saturation attacks on reduced-round versions of Skipjack. To begin with, we will show how to construct a 16-round distinguisher which distinguishes 16 rounds of Skipjack from a random permutation. The distinguisher is used to attack on 18(5~22) and 23(5~27) rounds of Skipjack. We can also construct a 20-round distinguisher based on the 16-round distinguisher. This distinguisher is used to attack on 22(1~22) and 27(1~27) rounds of Skipjack. The 80-bit user key of 27 rounds of Skipjack can be recovered with 250 chosen plaintexts and 3 · 275 encryption times.

Original languageEnglish
Title of host publicationFast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers
EditorsJoan Daemen, Vincent Rijmen
PublisherSpringer Verlag
Pages100-111
Number of pages12
ISBN (Print)9783540440093
DOIs
Publication statusPublished - 2002
Event9th International Workshop on Fast Software Encryption, FSE 2002 - Leuven, Belgium
Duration: 2002 Feb 42002 Feb 6

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2365
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other9th International Workshop on Fast Software Encryption, FSE 2002
CountryBelgium
CityLeuven
Period02/2/402/2/6

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Saturation attacks on reduced round Skipjack'. Together they form a unique fingerprint.

  • Cite this

    Hwang, K., Lee, W., Lee, S., Lee, S., & Lim, J. (2002). Saturation attacks on reduced round Skipjack. In J. Daemen, & V. Rijmen (Eds.), Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers (pp. 100-111). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2365). Springer Verlag. https://doi.org/10.1007/3-540-45661-9_8