Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2001, Vol. 18 ›› Issue (2): 181-185.DOI: 10.7523/j.issn.2095-6134.2001.2.017

Previous Articles     Next Articles

On E2 and Camellia Block Cipher

Wu Wenling1,2   

  1. 1. State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences;
    2. Engineering Research Center of Information Security Technology, Chinese Academy of Sciences, Beijing 100080
  • Received:2001-04-29 Online:2001-03-10

Abstract:

E2 and Camellia were developed by NTT in recent two years,which reflect the design level of block cipher in Japan.We discuss their speciality and design skill.Firstly,we point out the property of FL and FL -1 which could be used to attack Camellia by meet-in-middle.Next we analyze the variant of Camellia-Camellia *,and the result show that truncated differential cryptanalysis threaten the security of the 10-round Camellia *.Therefore it is important using different S-boxes in Camellia.Finally we analyze the variant of E2-E2 *,and the result show that truncated differential cryptanalysis threaten the security of the 12-round E2 *.So the construction of P is important in the design of block cipher.

Key words: differential truncated, differential cryptanalysis, block cipher

CLC Number: