MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Yukiyasu TSUNOO, Teruo SAITO, Hiroki NAKASHIMA, Maki SHIGERI, "Higher Order Differential Attack on 6-Round MISTY1" in IEICE TRANSACTIONS on Fundamentals,
vol. E92-A, no. 1, pp. 3-10, January 2009, doi: 10.1587/transfun.E92.A.3.
Abstract: MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E92.A.3/_p
Copy
@ARTICLE{e92-a_1_3,
author={Yukiyasu TSUNOO, Teruo SAITO, Hiroki NAKASHIMA, Maki SHIGERI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Higher Order Differential Attack on 6-Round MISTY1},
year={2009},
volume={E92-A},
number={1},
pages={3-10},
abstract={MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.},
keywords={},
doi={10.1587/transfun.E92.A.3},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Higher Order Differential Attack on 6-Round MISTY1
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 3
EP - 10
AU - Yukiyasu TSUNOO
AU - Teruo SAITO
AU - Hiroki NAKASHIMA
AU - Maki SHIGERI
PY - 2009
DO - 10.1587/transfun.E92.A.3
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E92-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2009
AB - MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.
ER -