A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Yonglin Hao , Dongxia Bai , Leibo Li

ABSTRACT

This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96/ 128. We construct a 4-round distinguisher and lower the memory requirement from 2100 to 244 using the differential enumeration technique. Based on the distinguisher, we launch a MITM attack on 7-round mCrypton-64/96/128 with complexities of 244 64-bit blocks and 257 encryptions. Then we extend the basic attack to 8 rounds for mCrypton-128 by adding some key-bridging techniques. The 8-round attack on mCrypton-128 requires a time complexity 2100 and a memory complexity 244. Furthermore, we construct a 5-round distinguisher and propose a MITM attack on 9-round mCrypton-128 with a time complexity of 2115 encryptions and a memory complexity of 2113 64-bit blocks. More... »

PAGES

166-183

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13

DOI

http://dx.doi.org/10.1007/978-3-319-11698-3_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1006041236


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/17", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Psychology and Cognitive Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1701", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Psychology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hao", 
        "givenName": "Yonglin", 
        "id": "sg:person.014270173173.47", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014270173173.47"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bai", 
        "givenName": "Dongxia", 
        "id": "sg:person.013743431562.21", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013743431562.21"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China", 
          "id": "http://www.grid.ac/institutes/grid.27255.37", 
          "name": [
            "Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Li", 
        "givenName": "Leibo", 
        "id": "sg:person.015342573031.14", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015342573031.14"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96/ 128. We construct a 4-round distinguisher and lower the memory requirement from 2100 to 244 using the differential enumeration technique. Based on the distinguisher, we launch a MITM attack on 7-round mCrypton-64/96/128 with complexities of 244 64-bit blocks and 257 encryptions. Then we extend the basic attack to 8 rounds for mCrypton-128 by adding some key-bridging techniques. The 8-round attack on mCrypton-128 requires a time complexity 2100 and a memory complexity 244. Furthermore, we construct a 5-round distinguisher and propose a MITM attack on 9-round mCrypton-128 with a time complexity of 2115 encryptions and a memory complexity of 2113 64-bit blocks.", 
    "editor": [
      {
        "familyName": "Au", 
        "givenName": "Man Ho", 
        "type": "Person"
      }, 
      {
        "familyName": "Carminati", 
        "givenName": "Barbara", 
        "type": "Person"
      }, 
      {
        "familyName": "Kuo", 
        "givenName": "C.-C. Jay", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-11698-3_13", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-11697-6", 
        "978-3-319-11698-3"
      ], 
      "name": "Network and System Security", 
      "type": "Book"
    }, 
    "keywords": [
      "rounds", 
      "attacks", 
      "technique", 
      "block", 
      "middle attack", 
      "MITM attacks", 
      "meet", 
      "version", 
      "memory requirements", 
      "requirements", 
      "enumeration technique", 
      "complexity", 
      "encryption", 
      "basic attacks", 
      "time complexity", 
      "memory complexity", 
      "distinguisher", 
      "mCrypton", 
      "paper"
    ], 
    "name": "A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique", 
    "pagination": "166-183", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1006041236"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-11698-3_13"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-11698-3_13", 
      "https://app.dimensions.ai/details/publication/pub.1006041236"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-06-01T22:34", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_387.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-11698-3_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11698-3_13'


 

This table displays all metadata directly associated to this object as RDF triples.

106 TRIPLES      23 PREDICATES      45 URIs      38 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-11698-3_13 schema:about anzsrc-for:17
2 anzsrc-for:1701
3 schema:author N8c290361bdb543cb8c29547efc461f20
4 schema:datePublished 2014
5 schema:datePublishedReg 2014-01-01
6 schema:description This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96/ 128. We construct a 4-round distinguisher and lower the memory requirement from 2100 to 244 using the differential enumeration technique. Based on the distinguisher, we launch a MITM attack on 7-round mCrypton-64/96/128 with complexities of 244 64-bit blocks and 257 encryptions. Then we extend the basic attack to 8 rounds for mCrypton-128 by adding some key-bridging techniques. The 8-round attack on mCrypton-128 requires a time complexity 2100 and a memory complexity 244. Furthermore, we construct a 5-round distinguisher and propose a MITM attack on 9-round mCrypton-128 with a time complexity of 2115 encryptions and a memory complexity of 2113 64-bit blocks.
7 schema:editor N7a4c9c325b064739b5d0352aa1645272
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N4f02f27634804dca8660004baa0ad33e
12 schema:keywords MITM attacks
13 attacks
14 basic attacks
15 block
16 complexity
17 distinguisher
18 encryption
19 enumeration technique
20 mCrypton
21 meet
22 memory complexity
23 memory requirements
24 middle attack
25 paper
26 requirements
27 rounds
28 technique
29 time complexity
30 version
31 schema:name A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
32 schema:pagination 166-183
33 schema:productId N21b4fdbe536947d48bbb8b4f45c68687
34 N92724dccc3ed4450a6c7983bc1bf52da
35 schema:publisher N474a71e34d764d0eba5fa2053bb3e1fa
36 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006041236
37 https://doi.org/10.1007/978-3-319-11698-3_13
38 schema:sdDatePublished 2022-06-01T22:34
39 schema:sdLicense https://scigraph.springernature.com/explorer/license/
40 schema:sdPublisher N99f2abcb5f31472abfbebe79aedbe25b
41 schema:url https://doi.org/10.1007/978-3-319-11698-3_13
42 sgo:license sg:explorer/license/
43 sgo:sdDataset chapters
44 rdf:type schema:Chapter
45 N162997791c924c4db4b756d5e4481cad rdf:first sg:person.015342573031.14
46 rdf:rest rdf:nil
47 N21b4fdbe536947d48bbb8b4f45c68687 schema:name doi
48 schema:value 10.1007/978-3-319-11698-3_13
49 rdf:type schema:PropertyValue
50 N33587393889244e09a47cf5bc575b66c schema:familyName Carminati
51 schema:givenName Barbara
52 rdf:type schema:Person
53 N474a71e34d764d0eba5fa2053bb3e1fa schema:name Springer Nature
54 rdf:type schema:Organisation
55 N4f02f27634804dca8660004baa0ad33e schema:isbn 978-3-319-11697-6
56 978-3-319-11698-3
57 schema:name Network and System Security
58 rdf:type schema:Book
59 N7a4c9c325b064739b5d0352aa1645272 rdf:first Nd74d08d1101f4b8d9fcf808b05dc168b
60 rdf:rest Ne438df04e2274263bd42ad25eccfa8c2
61 N8c290361bdb543cb8c29547efc461f20 rdf:first sg:person.014270173173.47
62 rdf:rest Nb1f88eb0463b41f18b5620aa1abcf481
63 N92724dccc3ed4450a6c7983bc1bf52da schema:name dimensions_id
64 schema:value pub.1006041236
65 rdf:type schema:PropertyValue
66 N99f2abcb5f31472abfbebe79aedbe25b schema:name Springer Nature - SN SciGraph project
67 rdf:type schema:Organization
68 Nb1f88eb0463b41f18b5620aa1abcf481 rdf:first sg:person.013743431562.21
69 rdf:rest N162997791c924c4db4b756d5e4481cad
70 Nbbc8882e7e6e49049fb402e88635893c rdf:first Nf8a0225278ea49d19b384dc35ce2f849
71 rdf:rest rdf:nil
72 Nd74d08d1101f4b8d9fcf808b05dc168b schema:familyName Au
73 schema:givenName Man Ho
74 rdf:type schema:Person
75 Ne438df04e2274263bd42ad25eccfa8c2 rdf:first N33587393889244e09a47cf5bc575b66c
76 rdf:rest Nbbc8882e7e6e49049fb402e88635893c
77 Nf8a0225278ea49d19b384dc35ce2f849 schema:familyName Kuo
78 schema:givenName C.-C. Jay
79 rdf:type schema:Person
80 anzsrc-for:17 schema:inDefinedTermSet anzsrc-for:
81 schema:name Psychology and Cognitive Sciences
82 rdf:type schema:DefinedTerm
83 anzsrc-for:1701 schema:inDefinedTermSet anzsrc-for:
84 schema:name Psychology
85 rdf:type schema:DefinedTerm
86 sg:person.013743431562.21 schema:affiliation grid-institutes:grid.12527.33
87 schema:familyName Bai
88 schema:givenName Dongxia
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013743431562.21
90 rdf:type schema:Person
91 sg:person.014270173173.47 schema:affiliation grid-institutes:grid.12527.33
92 schema:familyName Hao
93 schema:givenName Yonglin
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014270173173.47
95 rdf:type schema:Person
96 sg:person.015342573031.14 schema:affiliation grid-institutes:grid.27255.37
97 schema:familyName Li
98 schema:givenName Leibo
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015342573031.14
100 rdf:type schema:Person
101 grid-institutes:grid.12527.33 schema:alternateName Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China
102 schema:name Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China
103 rdf:type schema:Organization
104 grid-institutes:grid.27255.37 schema:alternateName Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China
105 schema:name Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China
106 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...