A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Yonglin Hao , Dongxia Bai , Leibo Li

ABSTRACT

This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96/ 128. We construct a 4-round distinguisher and lower the memory requirement from 2100 to 244 using the differential enumeration technique. Based on the distinguisher, we launch a MITM attack on 7-round mCrypton-64/96/128 with complexities of 244 64-bit blocks and 257 encryptions. Then we extend the basic attack to 8 rounds for mCrypton-128 by adding some key-bridging techniques. The 8-round attack on mCrypton-128 requires a time complexity 2100 and a memory complexity 244. Furthermore, we construct a 5-round distinguisher and propose a MITM attack on 9-round mCrypton-128 with a time complexity of 2115 encryptions and a memory complexity of 2113 64-bit blocks. More... »

PAGES

166-183

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13

DOI

http://dx.doi.org/10.1007/978-3-319-11698-3_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1006041236


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/17", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Psychology and Cognitive Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1701", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Psychology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hao", 
        "givenName": "Yonglin", 
        "id": "sg:person.014270173173.47", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014270173173.47"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bai", 
        "givenName": "Dongxia", 
        "id": "sg:person.013743431562.21", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013743431562.21"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China", 
          "id": "http://www.grid.ac/institutes/grid.27255.37", 
          "name": [
            "Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Li", 
        "givenName": "Leibo", 
        "id": "sg:person.015342573031.14", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015342573031.14"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96/ 128. We construct a 4-round distinguisher and lower the memory requirement from 2100 to 244 using the differential enumeration technique. Based on the distinguisher, we launch a MITM attack on 7-round mCrypton-64/96/128 with complexities of 244 64-bit blocks and 257 encryptions. Then we extend the basic attack to 8 rounds for mCrypton-128 by adding some key-bridging techniques. The 8-round attack on mCrypton-128 requires a time complexity 2100 and a memory complexity 244. Furthermore, we construct a 5-round distinguisher and propose a MITM attack on 9-round mCrypton-128 with a time complexity of 2115 encryptions and a memory complexity of 2113 64-bit blocks.", 
    "editor": [
      {
        "familyName": "Au", 
        "givenName": "Man Ho", 
        "type": "Person"
      }, 
      {
        "familyName": "Carminati", 
        "givenName": "Barbara", 
        "type": "Person"
      }, 
      {
        "familyName": "Kuo", 
        "givenName": "C.-C. Jay", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-11698-3_13", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-11697-6", 
        "978-3-319-11698-3"
      ], 
      "name": "Network and System Security", 
      "type": "Book"
    }, 
    "keywords": [
      "rounds", 
      "attacks", 
      "technique", 
      "block", 
      "middle attack", 
      "MITM attacks", 
      "meet", 
      "version", 
      "memory requirements", 
      "requirements", 
      "enumeration technique", 
      "complexity", 
      "encryption", 
      "basic attacks", 
      "time complexity", 
      "memory complexity", 
      "distinguisher", 
      "mCrypton", 
      "paper"
    ], 
    "name": "A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique", 
    "pagination": "166-183", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1006041236"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-11698-3_13"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-11698-3_13", 
      "https://app.dimensions.ai/details/publication/pub.1006041236"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-08-04T17:20", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/chapter/chapter_398.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-11698-3_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13'


 

This table displays all metadata directly associated to this object as RDF triples.

105 TRIPLES      22 PREDICATES      44 URIs      37 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-11698-3_13 schema:about anzsrc-for:17
2 anzsrc-for:1701
3 schema:author Nd95b35717ade49aca6a256b627910df2
4 schema:datePublished 2014
5 schema:datePublishedReg 2014-01-01
6 schema:description This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96/ 128. We construct a 4-round distinguisher and lower the memory requirement from 2100 to 244 using the differential enumeration technique. Based on the distinguisher, we launch a MITM attack on 7-round mCrypton-64/96/128 with complexities of 244 64-bit blocks and 257 encryptions. Then we extend the basic attack to 8 rounds for mCrypton-128 by adding some key-bridging techniques. The 8-round attack on mCrypton-128 requires a time complexity 2100 and a memory complexity 244. Furthermore, we construct a 5-round distinguisher and propose a MITM attack on 9-round mCrypton-128 with a time complexity of 2115 encryptions and a memory complexity of 2113 64-bit blocks.
7 schema:editor N54c13a813af84f95a518b5e1f060f4d5
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf N4ef36594ffb64ee1bd61e4f6f0fb5614
11 schema:keywords MITM attacks
12 attacks
13 basic attacks
14 block
15 complexity
16 distinguisher
17 encryption
18 enumeration technique
19 mCrypton
20 meet
21 memory complexity
22 memory requirements
23 middle attack
24 paper
25 requirements
26 rounds
27 technique
28 time complexity
29 version
30 schema:name A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
31 schema:pagination 166-183
32 schema:productId N9acb956e524042a98a28f2414e7ec827
33 Nf9304c50ebc44ddbae4b9890b1a38c39
34 schema:publisher N9f3d02a617034c21accdae6eed75ec84
35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006041236
36 https://doi.org/10.1007/978-3-319-11698-3_13
37 schema:sdDatePublished 2022-08-04T17:20
38 schema:sdLicense https://scigraph.springernature.com/explorer/license/
39 schema:sdPublisher N182ee42e8aec42d28717653ee20f726b
40 schema:url https://doi.org/10.1007/978-3-319-11698-3_13
41 sgo:license sg:explorer/license/
42 sgo:sdDataset chapters
43 rdf:type schema:Chapter
44 N182ee42e8aec42d28717653ee20f726b schema:name Springer Nature - SN SciGraph project
45 rdf:type schema:Organization
46 N4ef36594ffb64ee1bd61e4f6f0fb5614 schema:isbn 978-3-319-11697-6
47 978-3-319-11698-3
48 schema:name Network and System Security
49 rdf:type schema:Book
50 N5312ad2fe2d242869d61a0104332ca13 rdf:first N6ea0fcd165c744d0ae281da5261e57a2
51 rdf:rest rdf:nil
52 N54c13a813af84f95a518b5e1f060f4d5 rdf:first N8eaffbc9085a441db513112504000723
53 rdf:rest N6dad30f2900f4264b8a366e168f4c6d6
54 N5f0c329ff5ea4133a564518577ab2039 rdf:first sg:person.015342573031.14
55 rdf:rest rdf:nil
56 N6dad30f2900f4264b8a366e168f4c6d6 rdf:first N7fc628f6ddcd405cbd4e5203efd65084
57 rdf:rest N5312ad2fe2d242869d61a0104332ca13
58 N6ea0fcd165c744d0ae281da5261e57a2 schema:familyName Kuo
59 schema:givenName C.-C. Jay
60 rdf:type schema:Person
61 N7fc628f6ddcd405cbd4e5203efd65084 schema:familyName Carminati
62 schema:givenName Barbara
63 rdf:type schema:Person
64 N8eaffbc9085a441db513112504000723 schema:familyName Au
65 schema:givenName Man Ho
66 rdf:type schema:Person
67 N9acb956e524042a98a28f2414e7ec827 schema:name dimensions_id
68 schema:value pub.1006041236
69 rdf:type schema:PropertyValue
70 N9f3d02a617034c21accdae6eed75ec84 schema:name Springer Nature
71 rdf:type schema:Organisation
72 Nd0c44bb60c1446a1b8b822692293879c rdf:first sg:person.013743431562.21
73 rdf:rest N5f0c329ff5ea4133a564518577ab2039
74 Nd95b35717ade49aca6a256b627910df2 rdf:first sg:person.014270173173.47
75 rdf:rest Nd0c44bb60c1446a1b8b822692293879c
76 Nf9304c50ebc44ddbae4b9890b1a38c39 schema:name doi
77 schema:value 10.1007/978-3-319-11698-3_13
78 rdf:type schema:PropertyValue
79 anzsrc-for:17 schema:inDefinedTermSet anzsrc-for:
80 schema:name Psychology and Cognitive Sciences
81 rdf:type schema:DefinedTerm
82 anzsrc-for:1701 schema:inDefinedTermSet anzsrc-for:
83 schema:name Psychology
84 rdf:type schema:DefinedTerm
85 sg:person.013743431562.21 schema:affiliation grid-institutes:grid.12527.33
86 schema:familyName Bai
87 schema:givenName Dongxia
88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013743431562.21
89 rdf:type schema:Person
90 sg:person.014270173173.47 schema:affiliation grid-institutes:grid.12527.33
91 schema:familyName Hao
92 schema:givenName Yonglin
93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014270173173.47
94 rdf:type schema:Person
95 sg:person.015342573031.14 schema:affiliation grid-institutes:grid.27255.37
96 schema:familyName Li
97 schema:givenName Leibo
98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015342573031.14
99 rdf:type schema:Person
100 grid-institutes:grid.12527.33 schema:alternateName Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China
101 schema:name Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China
102 rdf:type schema:Organization
103 grid-institutes:grid.27255.37 schema:alternateName Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China
104 schema:name Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China
105 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...