Abstract
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against differential and linear cryptanalysis. In this paper we will show however that we can use low Hamming weighted differences to perform a practical, key dependent, differential attack on ICE. The main conclusion is that the keyed permutation is not as effective as it was conjectured to be.
Sponsored by the Timesec project of the Federal Office for Scientific, Technical and Cultural Affairs (OSTC), Belgium.
This author’s work was done during his stay in Leuven as a postdoctoral fellow of the Research Council of the K.U. Leuven.
F.W.O. research assistant, sponsored by the Fund for Scientific Research, Flanders — Belgium.
Chapter PDF
Similar content being viewed by others
References
I. Ben-Aroya and E. Biham, “Differential Cryptanalysis of Lucifer,” Advances in Cryptology — Crypto’ 93 Proceedings, LNCS 773, D. Stinson, Ed., Springer-Verlag, 1994, pp. 187–199.
E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
L. Brown, M. Kwan, J. Pieprzyk and J. Seberry, “Improving resistance to differential cryptanalysis and the redesign of LOKI,” Advances in Cryptology — AsiaCrypt’ 91 Proceedings, LNCS 739, H. Imai, R. Rivest, and T. Matsumoto, Eds., Springer-Verlag, 1993, pp. 36–50.
L. Brown, J. Pieprzyk and J. Seberry, “LOKI: A Cryptographic Primitive for Authentication and Secrecy Applications,” Advances in Cryptology — AusCrypt’ 90 Proceedings, LNCS 453, J. Seberry and J. Pieprzyk, Eds., Springer-Verlag, 1990, pp. 229–236.
FIPS 46, Data Encryption Standard, Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977.
L. Knudsen, “Cryptanalysis of LOKI’91,” Advances in Cryptology — AusCrypt’92 Proceedings, LNCS 718, J. Seberry and Y. Zheng, Eds., Springer-Verlag, 1993, pp. 196–208.
M. Kwan, “The Design of the ICE Encryption Algorithm,” Proceedings of the 4th Workshop on Fast Software Encryption, Haifa, Israel, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 69–82.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Van Rompay, B., Knudsen, L.R., Rijmen, V. (1998). Differential Cryptanalysis of the ICE Encryption Algorithm. In: Vaudenay, S. (eds) Fast Software Encryption. FSE 1998. Lecture Notes in Computer Science, vol 1372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69710-1_18
Download citation
DOI: https://doi.org/10.1007/3-540-69710-1_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64265-7
Online ISBN: 978-3-540-69710-7
eBook Packages: Springer Book Archive