Open Access
2013 Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee
J. Appl. Math. 2013: 1-10 (2013). DOI: 10.1155/2013/713673

Abstract

At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES’00 (AES-256), respectively. Our attack result on Anubis is superior to known cryptanalytic result on it. In the cases of Crypton-192/256 and mCrypton-96/128, our attacks are applicable to 8-round reduced versions. The attack results on mCrypton-96/128 are more practical than known cryptanalytic results on them.

Citation

Download Citation

Jinkeon Kang. Kitae Jeong. Jaechul Sung. Seokhie Hong. Kyungho Lee. "Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis." J. Appl. Math. 2013 1 - 10, 2013. https://doi.org/10.1155/2013/713673

Information

Published: 2013
First available in Project Euclid: 14 March 2014

zbMATH: 06950834
Digital Object Identifier: 10.1155/2013/713673

Rights: Copyright © 2013 Hindawi

Vol.2013 • 2013
Back to Top