swMATH ID: 21078
Software Authors: Moriai, Shiho; Shimoyama, Takeshi; Kaneko, Toshinobu
Description: Interpolation attacks of the block cipher: SNAKE. This paper presents an efficient interpolation attack using a computer algebra system. The interpolation attack proposed by {it T. Jakobsen} and {it L. R. Knudsen}, “The interpolation attack on block ciphers”, Fast Software Encryption, FSE’97, Lect. Notes Comput. Sci. 1267, 28–40 (1997)] was shown to be effective for attacking ciphers that use simple algebraic functions. However, there was a problem that the complexity and the number of pairs of plaintexts and ciphertexts required for the attack can be overestimated. The authors solve this problem by first, finding the actual number of coefficients in the polynomial (or rational expression) used in the attack by using a computer algebra system, and second, by finding the polynomial (or rational expression) with fewest coefficients by choosing the plaintexts. par They apply this interpolation attack to the block cipher SNAKE proposed by {it C. Lee} and {it Y. Cha} [“The block cipher: SNAKE with provable resistance against DC and LC attacks”, in: Proc. 1997 Korea-Japan Joint Workshop on Information Security and Cryptology (JW-ISC’97), 3–17 (1997)]. In the SNAKE family there are two types of Feistel ciphers, SNAKE(1) and SNAKE(2), with different round functions. Both of them use the inverse function in Galois field \(GF(2^m)\) as \(S\)-box. The authors show that when the block size is 64 bits and \(m=8\), all round keys are recovered for SNAKE(1) and SNAKE(2) with up to 11 rounds. Moreover, when the block size is 128 bits and \(m=16\), all round keys are recovered for SNAKE(1) with up to 15 rounds and SNAKE(2) with up to 16 rounds.
Homepage: https://link.springer.com/chapter/10.1007/3-540-48519-8_20
Keywords: interpolation attack; block cipher
Related Software: ARIA; Risa/Asir
Cited in: 2 Publications

Cited in 0 Serials

Citations by Year