11-Round Impossible Differential Algebraic Attack for Serpent Encryption Algorithm
11-Round Impossible Differential Algebraic Attack for Serpent Encryption Algorithm
摘要
This paper explored algebraic features of nonlinear parts in Serpent encryption algorithm and offered an 11-round Serpent-128 impossible differential algebraic attack through utilizing the method in constructing S-box algebraic equations. The new method analyzed block ll-round Serpent with 2127 selected plaintexts and 2-29 bytes memory space at the same time of giving a new design principle of S-box anti-algebraic attack.
This paper explored algebraic features of nonlinear parts in Serpent encryption algorithm and offered an 11-round Serpent-128 impossible differential algebraic attack through utilizing the method in constructing S-box algebraic equations. The new method analyzed block ll-round Serpent with 2127 selected plaintexts and 2-29 bytes memory space at the same time of giving a new design principle of S-box anti-algebraic attack.
作者
HU Zhihua1,2, QIN Zhongping3 1. School of Computer, Wuhan University, Wuhan 430072, Hubei, China
2. College of Mathematical and Information Sciences,Huanggang Normal University, Huanggang 438000, Hubei, China
3. School of Software Engineering, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China
基金
Supported by the Natural Science Foundation of Hubei Province(Q20102905)
参考文献11
-
1Nicolas T, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations[C]//Proceedings of Cryptology-Asiacrypt 2002. Berlin: Springer-Verlag, 2002: 13-19.
-
2Carlos C, Laurent G. An analysis of the XSL algorithm[C]// Proceedings of Cryptology-Asiacrypt 2005. Berlin: Springer- Verlag, 2005: 333-353.
-
3Biham E, Dunkelman O, Keller N. Linear cryptanalysis of reduced round serpent[C]//The 8th Proceedings of Fast Software Encryption. Berlin: Springer-Verlag, 2002: 16-27.
-
4Biham E, Dunkelman O, Keller N. Differential-linear cryptanalysis of serpent[C]//The lOth Proceedings of Fast Software Encryption. Berlin: Springer-Verlag, 2003: 9-21.
-
5Collard B, Standaert F, Quisquater J. Improved and multiple linear cryptanalysis of reduced round serpent[C]//Proceedings of Inscrypt 2007. Berlin: Springer-Verlag, 2007: 77-88.
-
6Dunkelman O, Indesteege S, Keller N. A differential-linear attack on 12-round Serpent[C]//Progress in Cryptology-Indocrypt 2008. Berlin: Springer-Verlag, 2008: 308-321.
-
7Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations[C]//Proceedings of Cryptology-Asiacrypt 2002. Berlin: Springer-Verlag, 2002: 267- 287.
-
8Courtois N, Shamir A, Patarin J, et al. An efficient algorithms for solving overdefined systems of multivariate polynomial equations[C]//Progress in Euroerypt 2000. Berlin: Springer- Verlag, 2000: 308-321.
-
9Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]// Proceedings of Eurocrypt'99. Berlin: Springer-Verlag, 1999: 12-23.
-
10Biham E, Dunkelman O, Neller N. The rectangle attack- rectangling the Serpent[C]//Proceedings of Eurocrypt'01.Berlin: Soringer-Verlag, 2001:340-357.
-
1马宇川.Ivy Bridge专用高频内存 博帝毒蛇Xtreme Division 2 DDR3 2400 8GB套装[J].微型计算机,2012(22):48-48.
-
2刘莺迎.Serpent密码算法在单片机上的实现及优化[J].科技创新与应用,2012,2(12Z):65-65.
-
3BlueSpress0.Razer鼠标驯服记[J].计算机应用文摘,2006(2):47-49.
-
4伊·布德洛,赵立喜.程序控制的丈夫[J].乡镇企业导报,2005(6):47-47.
-
5文图.声音就该是无线的[J].微型计算机,2010(35):118-119.
-
6王欣.为了鼠标 团结起来 Microsoft Habu[J].个人电脑,2007,13(4):50-50.
-
7毒蛇獠牙 Razer Moray+虎鳗升级版耳机[J].电脑爱好者,2009(20):106-106.
-
8任万杰,刘昌海.毒蛇庄稼地[J].故事大王,2013(12):73-74.
-
9冯楠.基于GPU和CPU协同处理实现的Canopy算法探索[J].硅谷,2012(9):21-22. 被引量:1
-
10李治,张其善.使用硬盘序列号对软件进行加密的研究[J].遥测遥控,2001,22(6):41-45.