Paper Abstract and Keywords |
Presentation |
2006-03-17 13:50
Analysis of Tiger in Encryption Mode Hirotaka Yoshida (Hitachi), Alex Biryukov, Bart Preneel (Leuven), Dai Watanabe (Hitachi) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Tiger is a cryptographic hash function with 192-bit hash length which was proposed by Anderson and Biham in 1996. Although its structure is similar to widely used hash functions such as SHA-1 and MD5, the underlying
block cipher has a stronger and faster avalanche coming from S-boxes from 8 bits to 64 bits. In this paper,
we analyze the compression function of Tiger by studying security of the underlying block cipher called Tiger in encryption mode against differential style attacks. We show attacks on Tiger in encryption mode reduced to 15 rounds (out of 24 rounds). |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Tiger / Boomerang Attacks / Related-Key Rectangle Attacks / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 105, no. 664, ISEC2005-162, pp. 61-66, March 2006. |
Paper # |
ISEC2005-162 |
Date of Issue |
2006-03-10 (IT, ISEC, WBS) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
WBS IT ISEC |
Conference Date |
2006-03-16 - 2006-03-17 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Nagoya Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
ISEC |
Conference Code |
2006-03-WBS-IT-ISEC |
Language |
English |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Analysis of Tiger in Encryption Mode |
Sub Title (in English) |
|
Keyword(1) |
Tiger |
Keyword(2) |
Boomerang Attacks |
Keyword(3) |
Related-Key Rectangle Attacks |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Hirotaka Yoshida |
1st Author's Affiliation |
HITACHI, Ltd., Systems Development Laboratory (Hitachi) |
2nd Author's Name |
Alex Biryukov |
2nd Author's Affiliation |
Katholieke Universiteit Leuven, Dept.~ESAT/SCD-COSIC (Leuven) |
3rd Author's Name |
Bart Preneel |
3rd Author's Affiliation |
Katholieke Universiteit Leuven, Dept.~ESAT/SCD-COSIC (Leuven) |
4th Author's Name |
Dai Watanabe |
4th Author's Affiliation |
HITACHI, Ltd., Systems Development Laboratory (Hitachi) |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2006-03-17 13:50:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
IT2005-105, ISEC2005-162, WBS2005-119 |
Volume (vol) |
vol.105 |
Number (no) |
no.662(IT), no.664(ISEC), no.666(WBS) |
Page |
pp.61-66 |
#Pages |
6 |
Date of Issue |
2006-03-10 (IT, ISEC, WBS) |
|