The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Dalam makalah ini, kami menyemak semula keselamatan kunci berkaitan sifir blok TWINE dengan kekunci 80-bit dan 128-bit. Menggunakan algoritma carian automatik bantuan MILP, kami menunjukkan penilaian TWINE sebelumnya dengan kunci 80-bit adalah salah, dan memberikan hasil penilaian yang diperbetulkan. Selain itu, kami menunjukkan penilaian keselamatan pertama TWINE dengan kunci 128-bit dalam tetapan kunci berkaitan, yang tidak dapat dilaksanakan kerana kos pengiraan yang tinggi dalam cadangan asal.
Kosei SAKAMOTO
University of Hyogo
Kazuhiko MINEMATSU
NEC Corporation
Nao SHIBATA
NEC Solution Innovators
Maki SHIGERI
NEC Solution Innovators
Hiroyasu KUBO
NEC Solution Innovators
Yuki FUNABIKI
Kobe University
Takanori ISOBE
University of Hyogo,National Institute of Information and Communications Technology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Kosei SAKAMOTO, Kazuhiko MINEMATSU, Nao SHIBATA, Maki SHIGERI, Hiroyasu KUBO, Yuki FUNABIKI, Takanori ISOBE, "Security of Related-Key Differential Attacks on TWINE, Revisited" in IEICE TRANSACTIONS on Fundamentals,
vol. E103-A, no. 1, pp. 212-214, January 2020, doi: 10.1587/transfun.2019CIL0004.
Abstract: In this paper, we revisit related-key security of TWINE block cipher with 80-bit and 128-bit keys. Using an MILP-aided automatic search algorithm, we point out the previous evaluation of TWINE with a 80-bit key is wrong, and give a corrected evaluation result. Besides, we show a first security evaluation of TWINE with a 128-bit key in the related-key setting, which was infeasible due to the high computation cost in the original proposal.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2019CIL0004/_p
Salinan
@ARTICLE{e103-a_1_212,
author={Kosei SAKAMOTO, Kazuhiko MINEMATSU, Nao SHIBATA, Maki SHIGERI, Hiroyasu KUBO, Yuki FUNABIKI, Takanori ISOBE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Security of Related-Key Differential Attacks on TWINE, Revisited},
year={2020},
volume={E103-A},
number={1},
pages={212-214},
abstract={In this paper, we revisit related-key security of TWINE block cipher with 80-bit and 128-bit keys. Using an MILP-aided automatic search algorithm, we point out the previous evaluation of TWINE with a 80-bit key is wrong, and give a corrected evaluation result. Besides, we show a first security evaluation of TWINE with a 128-bit key in the related-key setting, which was infeasible due to the high computation cost in the original proposal.},
keywords={},
doi={10.1587/transfun.2019CIL0004},
ISSN={1745-1337},
month={January},}
Salinan
TY - JOUR
TI - Security of Related-Key Differential Attacks on TWINE, Revisited
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 212
EP - 214
AU - Kosei SAKAMOTO
AU - Kazuhiko MINEMATSU
AU - Nao SHIBATA
AU - Maki SHIGERI
AU - Hiroyasu KUBO
AU - Yuki FUNABIKI
AU - Takanori ISOBE
PY - 2020
DO - 10.1587/transfun.2019CIL0004
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E103-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2020
AB - In this paper, we revisit related-key security of TWINE block cipher with 80-bit and 128-bit keys. Using an MILP-aided automatic search algorithm, we point out the previous evaluation of TWINE with a 80-bit key is wrong, and give a corrected evaluation result. Besides, we show a first security evaluation of TWINE with a 128-bit key in the related-key setting, which was infeasible due to the high computation cost in the original proposal.
ER -