| Authors | H. Raddum and L. Knudsen |
| Title | On Noekeon |
| Afilliation | , Communication Systems |
| Project(s) | Simula UiB |
| Status | Published |
| Publication Type | Proceedings, refereed |
| Year of Publication | 2001 |
| Conference Name | Second Open NESSIE workshop |
| Date Published | 09/2001 |
| Publisher | Royal Holloway Univerity of London |
| Place Published | London |
| Abstract | In this note we analyse Noekeon, a 128-bit block cipher submitted to the NESSIE project. It is shown that for six of seven S-boxes which satisfy the design criteria of the Noekeon designers the resulting block ciphers are vulnerable to either a differential attack, a linear attack or both. One conclusion is that Noekeon is not designed according to the wide trail strategy. Also, it is shown that there exist many related keys for which plaintexts of certain differences result in ciphertexts of certain differences with high probabilities. Noekeon has two key-schedules, one for applications where related-key attacks are not considered dangerous and one for applications where related-key attacks can be mounted. In this paper it is shown that for any given user-selected keys there are many related keys independently of which key-schedule is used. |
| Citation Key | 24064 |
