Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and anubis

Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee

Research output: Contribution to journalArticlepeer-review

9 Scopus citations


At AES'00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES'00 (AES-256), respectively. Our attack result on Anubis is superior to known cryptanalytic result on it. In the cases of Crypton-192/256 and mCrypton-96/128, our attacks are applicable to 8-round reduced versions. The attack results on mCrypton-96/128 are more practical than known cryptanalytic results on them.

Original languageEnglish
Article number713673
JournalJournal of Applied Mathematics
StatePublished - 2013


Dive into the research topics of 'Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and anubis'. Together they form a unique fingerprint.

Cite this