Related-key rectangle attack on the full ARIRANG encryption mode
The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round related-key rectangle attack of the ARIRANG encrypti...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419140/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537788089991168 |
---|---|
author | ZHANG Peng1 LI Rui-lin1 LI Chao1 |
author_facet | ZHANG Peng1 LI Rui-lin1 LI Chao1 |
author_sort | ZHANG Peng1 |
collection | DOAJ |
description | The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round related-key rectangle attack of the ARIRANG encryption mode was presented,which was the first cryptanalytic result of the ARIRANG encryption mode.The result shows that the ARIRANG encryption mode as a block cipher is not immune to the related-key rectangle attack. |
format | Article |
id | doaj-art-5c15eda77e034b9cb666448defe6baab |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2011-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-5c15eda77e034b9cb666448defe6baab2025-01-14T08:22:25ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-0132152274419140Related-key rectangle attack on the full ARIRANG encryption modeZHANG Peng1LI Rui-lin1LI Chao1The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round related-key rectangle attack of the ARIRANG encryption mode was presented,which was the first cryptanalytic result of the ARIRANG encryption mode.The result shows that the ARIRANG encryption mode as a block cipher is not immune to the related-key rectangle attack.http://www.joconline.com.cn/zh/article/74419140/block cipherhash functionARIRANGrelated-key rectangle attacklinear transformation |
spellingShingle | ZHANG Peng1 LI Rui-lin1 LI Chao1 Related-key rectangle attack on the full ARIRANG encryption mode Tongxin xuebao block cipher hash function ARIRANG related-key rectangle attack linear transformation |
title | Related-key rectangle attack on the full ARIRANG encryption mode |
title_full | Related-key rectangle attack on the full ARIRANG encryption mode |
title_fullStr | Related-key rectangle attack on the full ARIRANG encryption mode |
title_full_unstemmed | Related-key rectangle attack on the full ARIRANG encryption mode |
title_short | Related-key rectangle attack on the full ARIRANG encryption mode |
title_sort | related key rectangle attack on the full arirang encryption mode |
topic | block cipher hash function ARIRANG related-key rectangle attack linear transformation |
url | http://www.joconline.com.cn/zh/article/74419140/ |
work_keys_str_mv | AT zhangpeng1 relatedkeyrectangleattackonthefullarirangencryptionmode AT liruilin1 relatedkeyrectangleattackonthefullarirangencryptionmode AT lichao1 relatedkeyrectangleattackonthefullarirangencryptionmode |