Related-key rectangle attack on the full ARIRANG encryption mode

The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round related-key rectangle attack of the ARIRANG encrypti...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG Peng1, LI Rui-lin1, LI Chao1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419140/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537788089991168
author ZHANG Peng1
LI Rui-lin1
LI Chao1
author_facet ZHANG Peng1
LI Rui-lin1
LI Chao1
author_sort ZHANG Peng1
collection DOAJ
description The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round related-key rectangle attack of the ARIRANG encryption mode was presented,which was the first cryptanalytic result of the ARIRANG encryption mode.The result shows that the ARIRANG encryption mode as a block cipher is not immune to the related-key rectangle attack.
format Article
id doaj-art-5c15eda77e034b9cb666448defe6baab
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-5c15eda77e034b9cb666448defe6baab2025-01-14T08:22:25ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-0132152274419140Related-key rectangle attack on the full ARIRANG encryption modeZHANG Peng1LI Rui-lin1LI Chao1The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round related-key rectangle attack of the ARIRANG encryption mode was presented,which was the first cryptanalytic result of the ARIRANG encryption mode.The result shows that the ARIRANG encryption mode as a block cipher is not immune to the related-key rectangle attack.http://www.joconline.com.cn/zh/article/74419140/block cipherhash functionARIRANGrelated-key rectangle attacklinear transformation
spellingShingle ZHANG Peng1
LI Rui-lin1
LI Chao1
Related-key rectangle attack on the full ARIRANG encryption mode
Tongxin xuebao
block cipher
hash function
ARIRANG
related-key rectangle attack
linear transformation
title Related-key rectangle attack on the full ARIRANG encryption mode
title_full Related-key rectangle attack on the full ARIRANG encryption mode
title_fullStr Related-key rectangle attack on the full ARIRANG encryption mode
title_full_unstemmed Related-key rectangle attack on the full ARIRANG encryption mode
title_short Related-key rectangle attack on the full ARIRANG encryption mode
title_sort related key rectangle attack on the full arirang encryption mode
topic block cipher
hash function
ARIRANG
related-key rectangle attack
linear transformation
url http://www.joconline.com.cn/zh/article/74419140/
work_keys_str_mv AT zhangpeng1 relatedkeyrectangleattackonthefullarirangencryptionmode
AT liruilin1 relatedkeyrectangleattackonthefullarirangencryptionmode
AT lichao1 relatedkeyrectangleattackonthefullarirangencryptionmode