Analysis of two attacks on reduced-round versions of the SMS4

Deniz Toz, Orr Dunkelman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

SMS4 is a 128-bit block cipher used in WAPI (the Chinese national standard for wireless networks). Up until recently, the best attacks on SMS4 known, in terms of the number of rounds, were the rectangle attack on 14 rounds and the impossible differential attack on 16 rounds (out of 32 rounds) presented by Lu. While analyzing them, we noticed that these attacks have flaws and that their complexity analysis is inaccurate. In this paper we make a more comprehensive analysis of these attacks and further improve these results.

Original languageEnglish
Title of host publicationInformation and Communications Security - 10th International Conference, ICICS 2008, Proceedings
PublisherSpringer Verlag
Pages141-156
Number of pages16
ISBN (Print)3540886249, 9783540886242
DOIs
StatePublished - 2008
Externally publishedYes
Event10th International Conference on Information and Communications Security, ICICS 2008 - Birmingham, United Kingdom
Duration: 20 Oct 200822 Oct 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5308 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Information and Communications Security, ICICS 2008
Country/TerritoryUnited Kingdom
CityBirmingham
Period20/10/0822/10/08

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Analysis of two attacks on reduced-round versions of the SMS4'. Together they form a unique fingerprint.

Cite this