Title :
Weak keys and plaintext recovery for the Dhall-Pal Block Cipher
Author :
Karen Korstanje;Liam Keliher
Author_Institution :
AceCrypt Research Group, Department of Mathematics and Computer Science, Mount Allison University, Sackville, New Brunswick Canada, E4L 1E6
fDate :
7/1/2015 12:00:00 AM
Abstract :
The Dhall-Pal Cipher (DPC) is a 128-bit block cipher with a 128-bit key introduced by Dhall and Pal in 2010. It is based on the substitution-permutation network (SPN) structure, and has elements in common with the Advanced Encryption Standard (AES). The most significant differences between the DPC and the AES occur in the linear transformation stage, some components of which are key-dependent in the DPC. In this paper we identify a large set of weak keys for the DPC, and we describe practical attacks enabled by these weak keys. We first present fast distinguishing attacks that succeed for approximately 2124 out of the 2128 keys. We then describe two plaintext-recovery attacks that succeed for 2120 keys. One of these plaintext-recovery attacks can decrypt any ciphertext using only 211 encryptions on average.
Keywords :
"Ciphers","Encryption","Standards","Computers","Mathematics","Computer science"
Conference_Titel :
Computers and Communication (ISCC), 2015 IEEE Symposium on
DOI :
10.1109/ISCC.2015.7405614