Abstract
In this paper we present a new cryptanalytic technique, based on impossible differentials, and use it to show that Skipjack reduced from 32 to 31 rounds can be broken by an attack which is faster than exhaustive search.
Chapter PDF
References
Carlisle M. Adams, The CAST-256 Encryption Algorithm, AES submission, available at http://www.entrust.com/resources/pdf/cast-256.pdf.
Ishai Ben-Aroya, Eli Biham, Differential Cryptanalysis of Lucifer, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’93, pp. 187–199, 1993.
Eli Biham, Cryptanalysis of Ladder-DES, proceedings of Fast Software Encryption, Haifa, Lecture Notes in Computer Science, pp. 134–138, 1997.
Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir, Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR, proceedings of Selected Areas in Cryptography, SAC’1998, Lecture Notes in Computer Science, 1998.
Eli Biham, Alex Biryukov, Adi Shamir, Miss in the Middle Attacks on IDEA, Khufu and Khafre, proceedings of Fast Software Encryption, Rome, Lecture Notes in Computer Science, 1999.
Eli Biham, Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
Cipher A. Deavours, Louis Kruh, Machine Cryptography and Modern Cryptanalysis, Artech House, 1985.
Lars Ramkilde Knudsen, DEAL-A 128-bit Block Cipher, AES submission, available at http://www.ii.uib.no/~larsr/papers/deal.ps, 1998.
Lars Ramkilde Knudsen, Matt Robshaw, David Wagner, private communication, 1998.
Xuejia Lai, James L. Massey, Sean Murphy, Markov Ciphers and Differential Cryptanalysis, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’91, pp. 17–38, 1991.
Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’93, pp. 386–397, 1993.
Ralph C. Merkle, Fast Software Encryption Functions, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’90, pp. 476–501, 1990.
Shoji Miyaguchi, Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm FEAL-8, Review of electrical communications laboratories, Vol. 36, No. 4, pp. 433–437, 1988.
National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46, January 1977.
Skipjack and KEA Algorithm Specifications, Version 2.0, 29 May 1998. Available at the National Institute of Standards and Technology’s web page, http://csrc.nist.gov/encryption/skipjack-kea.htm.
Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encryption Algorithm FEAL, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’87, pp. 267–278, 1987.
David Wagner, Further Attacks on 16 Rounds of SkipJack, private communication, July 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biham, E., Biryukov, A., Shamir, A. (1999). Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: Stern, J. (eds) Advances in Cryptology — EUROCRYPT ’99. EUROCRYPT 1999. Lecture Notes in Computer Science, vol 1592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48910-X_2
Download citation
DOI: https://doi.org/10.1007/3-540-48910-X_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65889-4
Online ISBN: 978-3-540-48910-8
eBook Packages: Springer Book Archive