International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

The Saturation Attack - a Bait for Twofish

Authors:
Stefan Lucks
Download:
URL: http://eprint.iacr.org/2000/046
Search ePrint
Search Google
Abstract: We introduce the notion of a saturation attack and present attacks on reduced-round versions of the Twofish block cipher. Our attack for all generic key sizes of Twofish (i.e., for 128-bit, 192-bit and 256-bit keys) improves on exhaustive key search for seven rounds of Twofish with full whitening, and for eight rounds of Twofish without whitening at the end. The core of the attack is a a key-independent distinguisher for six rounds of Twofish. The distinguisher is used to attack up to 7 rounds of Twofish with full whitening and and 8 rounds of Twofish with prewhitening only - half of the cipher. The attacks take up to 2^127 chosen plaintexts (half of the codebook!) and are 2-4 times faster than exhaustive search.
BibTeX
@misc{eprint-2000-11390,
  title={The Saturation Attack - a Bait for Twofish},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography /  AES, block ciphers, cryptanalysis},
  url={http://eprint.iacr.org/2000/046},
  note={preprint lucks@th.informatik.uni-mannheim.de 11214 received 14 Sep 2000},
  author={Stefan Lucks},
  year=2000
}