Abstract
This paper introduces the notion of a “saturation attack”. Consider a permutation p over w-bit words. If p is applied to all 2w disjoint words, the set of outputs is exactly the same as the set of inputs. A saturation attack exploits this fact. The current paper applies saturation attacks on reduced-round variants of the Twofish block cipher with up to seven rounds with full whitening or eight rounds without whitening at the end (i.e., half of the cipher). The attacks take up to 2127 chosen plaintexts (half of the codebook) and are 2–4 times faster than exhaustive search. The attacks are based on key-independent distinguishers for up to six rounds of Twofish, making extensive use of saturation properties.
Supported by German Science Foundation (DFG) grant KR1521/3-2.
Chapter PDF
References
E. Biham, A. Biryukov, A. Shamir, “Miss in the Middle Attacks on IDEA and Khufru”, Fast Software Encryption 1999, Springer LNCS 1636, pp. 124–138.
E. Biham, “Cryptanalysis of Ladder DES”, Fast Software Encryption 1997, Springer LNCS 1267, pp. 134–138.
C. D’Halluin, G. Bijnens, V. Rijmen, B., Preneel, “Attack on six round of Crypton”, Fast Software Encryption 1999, Springer LNCS 1636, pp. 46–59.
J. Daemen, L. Knudsen, V. Rijmen: “The block cipher Square”, Fast Software Encryption 1997, Springer LNCS 1267, pp. 149–165.
J. Daemen, V. Rijmen, “AES proposal: Rijndael” (2nd version)
N. Ferguson, “Impossible differentials in Twofish”, Twofish TR #5, 1999
N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, D. Whiting, “Improved Cryptanalysis of Rijndael” Fast Software Encryption 2000, to appear.
J. Kelsey, “Key Separation in Twofish”, Twofish TR #7, 2000
L. Knudsen, “Truncated and Higher Order Differentials”, Fast Software Encryption 1995, Springer LNCS 1008, pp. 196–211.
L. Knudsen, “Trawling Twofish (revisited)” May 15, 2000
C. H. Lim, “Crypton: a new 128-bit block cipher”
C. H. Lim, “A revised version of Crypton-Crypton V1.0-”, Fast Software Encryption 1999, Springer LNCS 1636, pp. 31–45.
F. Mirza, S. Murphy, “An Observation on the Key Schedule of Twofish”, In: The 2nd Advanced Encryption Standard Conference, pp. 151–154, April 1999
S. Murphy, “The Key Separation of Twofish”, 2000
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, “Twofish: A 128-bit Block Cipher”
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, “The Twofish Encryption Algorithm”, Wiley, 1999.
“The GNU Privacy Guard”, “http://www.gnupg.org/”.
“AES Development Effort”, NIST, “http://www.nist.gov/aes”.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lucks, S. (2002). The Saturation Attack — A Bait for Twofish. In: Matsui, M. (eds) Fast Software Encryption. FSE 2001. Lecture Notes in Computer Science, vol 2355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45473-X_1
Download citation
DOI: https://doi.org/10.1007/3-540-45473-X_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43869-4
Online ISBN: 978-3-540-45473-1
eBook Packages: Springer Book Archive