Related-key Impossible Differential Cryptanalysis of Full-round HIGHT

Saeed Rostami, Sadegh Bamohabbat Chafjiri, Seyed Amir Hossein Tabatabaei

2013

Abstract

.

References

  1. Biham, E., Biryukov, A., and Shamir, A. (1999). Miss in the middle attacks on idea and khufu. In FSE 1999, LNCS, vol. 1636. Springer, Heidelberg.
  2. Biham, E., Biryukov, A., and Shamir, A. (2005). Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In Journal of Cryptology 18(4). Springer, Heidelberg.
  3. Biham, E. and Shamir, A. (1991). Differential cryptanalysis of des-like cryptosystems. In CRYPTO 1990, LNCS, vol. 537. Springer, Heidelberg.
  4. Hong, D. and et al. (2006). Hight: A new block cipher suitable for low-resource device. In CHES 2006, LNCS, vol. 4249. Springer, Heidelberg.
  5. Hong, D., Koo, B., and kwon, D. (2011). Related-key attack on the full hight. In ICISC 2010, LNCS 6829. Springer, Heidelberg.
  6. Hong, D., Koo, B., and kwon, D. (2012). Biclique attack on the full hight. In ICISC 2011, LNCS, vol. 7259. Springer, Heidelberg.
  7. Lu, J. (2007). Cryptanalysis of reduced versions of the hight block cipher from ches 2006. In ICISC 2007, LNCS, vol. 4817. Springer, Heidelberg.
  8. Lucks, S. (2002). The saturation attacka bait for twofish. In FSE 2001, LNCS, vol. 2355. Springer, Heidelberg.
  9. Matsui, M. (1994). Linear cryptanalysis method for des cipher. In EUROCRYPT 1993, LNCS, vol. 765. Springer, Heidelberg.
  10. Ozen, O., Vaici, K., Tezcan, C., and Kocair, C. (2009). Lightweight block cipher revisited: Cryptanalysis of reduced round present and hight. In CANS 2009, LNCS, vol. 5888. Springer, Heidelberg.
  11. Zhang, P., Sun, B., and Li, C. (2009). Saturation attack on the block cipher hight. In ACISP 2009, LNCS, vol. 5594. Springer, Heidelberg.
Download


Paper Citation


in Harvard Style

Rostami S., Bamohabbat Chafjiri S. and Amir Hossein Tabatabaei S. (2013). Related-key Impossible Differential Cryptanalysis of Full-round HIGHT . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 537-542. DOI: 10.5220/0004528805370542


in Bibtex Style

@conference{secrypt13,
author={Saeed Rostami and Sadegh Bamohabbat Chafjiri and Seyed Amir Hossein Tabatabaei},
title={Related-key Impossible Differential Cryptanalysis of Full-round HIGHT},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={537-542},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004528805370542},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Related-key Impossible Differential Cryptanalysis of Full-round HIGHT
SN - 978-989-8565-73-0
AU - Rostami S.
AU - Bamohabbat Chafjiri S.
AU - Amir Hossein Tabatabaei S.
PY - 2013
SP - 537
EP - 542
DO - 10.5220/0004528805370542