Distinguishing Attack on XO-64

Tran Song Dat Phuc, Changhoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

XO-64 block cipher provides a high performance with small hardware requirement in implementation. It is designed in improvement of high applicability, high flexibility, and high reliability in fast and efficient telecommunication system, based on conception of data-dependent operation (DDO); same as some other ciphers MD-64, KT-64, Eagle-64, Eagle-128.; and substitution permutation network (SPN). Besides achieving high-speed rate in FPGA devices, this cipher also shows high secure against known attacks, such as differential attack, linear attack. In this paper, by constructing related-key differential characteristics with high probability on 6-round reduced XO-64, we explore the possibility to distinguish between a 6-round reduced XO-64 and a 64-bit random permutation. A distinguishing attack on a 6-round reduced XO-64 is proposed, requires complexities of 244 in data, 247 in memory, and 265 in computation time. In future, our attack method is expected to extend to related-key recovery attack on this cipher algorithm, and other ciphers with same type of structure designs so far.

Original languageEnglish
Title of host publication2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467386852
DOIs
StatePublished - 19 Apr 2016
Event3rd International Conference on Platform Technology and Service, PlatCon 2016 - Jeju, Korea, Republic of
Duration: 15 Feb 201617 Feb 2016

Publication series

Name2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings

Conference

Conference3rd International Conference on Platform Technology and Service, PlatCon 2016
Country/TerritoryKorea, Republic of
CityJeju
Period15/02/1617/02/16

Keywords

  • Block cipher
  • Cryptanalysis
  • Cryptography
  • Data-dependent Operation (DDO)
  • Distinguishing Attack
  • Substitution Permutation Network (SPN)
  • XO-64

Fingerprint

Dive into the research topics of 'Distinguishing Attack on XO-64'. Together they form a unique fingerprint.

Cite this