Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments

MD-64 is a 64-bit block cipher with a 128-bit secret key and is based on data-dependent operations for the fast hardware performance. MD-64 is suitable to applications in resource constrained environments such as wireless sensor networks. In this paper, we propose a related-key amplified boomerang attack on the full-round MD-64. Our attack requires 295 MD-64 encryptions with 243.1 related-key chosen plaintexts. This work is the first cryptanalytic result on MD-64 so far.

[1]  Seokhie Hong,et al.  Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 , 2007, ACISP.

[2]  Jongsung Kim,et al.  Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b , 2006, SCN.

[3]  Odysseas G. Koufopavlou,et al.  High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers , 2005, Mob. Networks Appl..

[4]  Seokhie Hong,et al.  Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 , 2004, ACISP.

[5]  Jongsung Kim,et al.  Security analysis of the SCO-family using key schedules , 2009, Inf. Sci..

[6]  N.D. Goots,et al.  Fast DDP-based ciphers: from hardware to software , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[7]  Nikolay A. Moldovyan,et al.  Fast Encryption Algorithm Spectr-H64 , 2001, MMM-ACNS.

[8]  Jongsung Kim,et al.  Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b , 2005, Mycrypt.

[9]  Sangjin Lee,et al.  A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 , 2002, ICICS.

[10]  Seokhie Hong,et al.  Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H , 2004, INDOCRYPT.

[11]  Seokhie Hong,et al.  Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property , 2003, MMM-ACNS.

[12]  Jongsung Kim,et al.  Related-Key Differential Attacks on Cobra-H64 and Cobra-H128 , 2005, IMACC.

[13]  Nikolay A. Moldovyan,et al.  A cipher based on data-dependent permutations , 2001, Journal of Cryptology.

[14]  Nikolay A. Moldovyan On Cipher Design Based on Switchable Controlled Operations , 2003, Int. J. Netw. Secur..

[15]  Eli Biham,et al.  Related-Key Boomerang and Rectangle Attacks , 2005, EUROCRYPT.

[16]  Nikolay A. Moldovyan,et al.  New Class of Cryptographic Primitives and Cipher Design for Networks Security , 2006, Int. J. Netw. Secur..

[17]  Nguyen Hieu Minh,et al.  New SDDO-Based Block Cipher for Wireless Sensor Network Security , 2010 .