• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (03): 524-528.

• 论文 • Previous Articles     Next Articles

Meet-in-the-middle attacks on E2   

GUAN Xiang1,WEI Yuechuan1,YANG Xiaoyuan 1,2   

  1. (1.Key Laboratory of Network & Information Security under the Chinese Armed Police Force,
    Department of Electronic,Engineering College of the Armed Police Force,Xi’an 710086;
    2.Institute of Information Security,Engineering College of Chinese Armed Police Force,Xi’an 710086,China)
  • Received:2013-11-14 Revised:2014-01-02 Online:2015-03-25 Published:2015-03-25

Abstract:

As a candidate of AES, E2 algorithm has attracted wide attention because of its unique two SP structures. We evaluate the security of E2 block cipher against meet-in-the-middle attacks. Based on the idea of meet-in-the-middle, by analyzing the feathers of E2 algorithm, a 4-round distinguisher is designed. Using the distinguisher, some meet-in-the-middle attacks are made on 5/6round E2128/256. It is shown that the E2-128 algorithm to 5-round and the E2-256 algorithm to 6-round are not immune to meet-in-the-middle attacks. This is the first time to use the meet-in-the-middle attacks to analyze the E2 algorithm. Compared with  the existing results, data complexity is reduced.

Key words: block cipher;meet-in-the-middle attack;E2;attack complexity