期刊文献+

42轮SHACAL-2新的相关密钥矩形攻击 被引量:4

New related-key rectangle attack on 42-round SHACAL-2
下载PDF
导出
摘要 利用SHACAL-2密码算法轮变换的特点,构造了一个新型的34轮区分器。基于该区分器和部分密钥分别猜测的技术,针对40轮、42轮简化SHACAL-2分别给出了新的攻击方法。研究结果表明:利用2个相关密钥,对40轮SHACAL-2进行相关密钥矩形攻击其数据复杂度约为2235选择明文数据量,计算复杂度约为2432.6次加密;而对42轮SHACAL-2进行相关密钥矩形攻击其数据复杂度约为2235选择明文数据量,计算复杂度约为2472.6次加密。与已有的结果相比较,这些新分析所需的数据复杂度和计算复杂度均有明显的降低。 A new 34-round related-key rectangle distinguisher was constructed by exploiting the properties of the round transform of SHACAL-2. Moreover, two new relate-key rectangle attacks on 40-round and 42-round reduced SHACAL-2 were presented by using both the distinguisher and a technique of key-byte guessing. It is shown that related-key rectangle attacks with only 2 related keys on 40-round and 42-round reduced SHACAL-2 all require data complexity of about 2235 chosen plaintexts and time complexity of about 2^432.6 encryptions on 40-round reduced SHACAL-2, and 2^472.6 encryptions on 42-round reduced SHACAL-2, respectively. The presented results are better than previous published cryptanalytic results on reduced SHACAL-2 in terms of both the data complexity and the time complexity.
出处 《通信学报》 EI CSCD 北大核心 2009年第1期7-11,17,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60673072) 国家重点基础研究发展计划(“973”计划)基金资助项目(2007CB311201) 国防科技重点实验室基金项目(9140C1107050806)~~
关键词 分组密码 相关密钥矩形攻击 SHACAL-2算法 计算复杂度 block cipher relate-key rectangle attack SHACAL-2 algorithm time complexity
  • 相关文献

参考文献13

  • 1NESSIE -- new European schemes for signatures, integrity and encryption, performance of optimized implementations of the NESSIE primitives, version 2.0[EB/OL]. http://www.cosic.esat.kuleuven.be/ nessieddeliverables/D21 -v2.pdf, 2008.
  • 2AOKI K, ICHIKAWA T, KANDA M, et al. Camellia: a 128-bit block cipher suitable for multiple platforms design and analysis[A]. Theoretical Aspects of Computer Software, Third International Symposium, TACS '97[C]. Sendai, Japan, 1997.39-56.
  • 3MATSUI M. New block encryption algorithm MISTY[A]. Fast Software Encryption, 4th International Workshop, FSE '97[C]. Haifa, Israel, 1997.54-68.
  • 4http://www.cosic.esat.kuleuven.belnessie[EB/OL]. 2008.
  • 5Secure Hash Standard FIPS 180-2 [S]. NIST, 2002.
  • 6DAEMEN J, RIJNMEN V. The Design of Rijndael AES: The Advanced Encryption Standard [M]. Berlin Heidelberg: Springer- Verlag, 2002, 30-45.
  • 7HONG S, KIM J, KIM G, et al. Impossible differential attack 30-round SHACAL-2[A]. Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India[C]. New Delhi, India, 2003.97-106.
  • 8SHIN Y, KIM J, KIM G, et al. Differential-linear type attacks on re duced rounds of SHACAL-2[A]. Information Security and Privacy 9th Australasian Conference, ACISP 2004[C]. Sydney, Australia, 2004. 110-122.
  • 9KIM J, KIM G. LEE S, et al. Related-key attacks on reduced rounds of SHACAL-2[A]. 5th International Conference on Cryptology in India[C]. Chennai (Madras), India, 2004. 175-190.
  • 10LU J, LEE C, KIM G, KELLER N, et al. Related-key attack on 42-round SHACAL-2[A]. 9th Information Security Conference[C]. 2006.85-100.

同被引文献48

  • 1韦永壮,胡予濮.简化AES-192和AES-256的相关密钥矩形新攻击[J].中国科学(F辑:信息科学),2009,39(2):246-253. 被引量:3
  • 2NESSIE: New European Schemes for Signatures, Integrity and Encryption, Performance of Optimized Implementations of the NESSIE Primitives, Version 2.0 EEB/OL]. [2000-11-1]. https://www, cosic, esat. kuleuven, be/nessie/ deliverables/D21-v2, pdf.
  • 3Aoki K, Ichikawa T, Kanda M, et al. Camellia: a 128-bit Block Cipher Suitable for Multiple Platforms Design and Analysis [C] //Proceedings of TACS 1997 : LNCS 1281. Berlin : Springer-Verlag, 1997 : 39-56.
  • 4Matsui M. New Block Encryption Algorithm MISTY [C]//Proceedings of FSE1997: LNCS1267. Berlin: Springer- Verlag, 1997: 54-68.
  • 5Daemen J, Rijnmen V. The design of Rijndael AES: the Advanced Encryption Standard [M]. 1st ed. Berlin: Springer- Verlag, 2002, 30-45.
  • 6Handschuh H, Naccache D. SHACAL, NESSIE[EB/OL]. [2001-6-1]. https://www, cosic, esat.kuleuven, be/nessie.
  • 7National Institute of Standards and Technology. Federal Information Processing Standards Publication 180-1 (FIPS180-1) --Secure Hash Standard (SHA) [EB/OL]. [1995-04-103. http://csrc, nist. gov/publications/fips/fips180/fips-180, pdf.
  • 8Lai Xuejia, Massey J-L, Murphy S. Markov Ciphers and Differential Cryptanalysis[C]//Proeeedings of EUROCRYPT1991 : LNCS547. Berlin: Springer-Verlag, 1992 : 17-38.
  • 9Hong S, Kim J, Kim G, et al. Impossible Differential Attack 30-round SHACAL-2 [C] //Proceedings of INDOCRYPT2003: LNCS2904. Berlin: Springer-Verlag, 2003: 97-106.
  • 10Shin Y, Kim J, Kim G, et al. Differential-linear Type Attacks on Reduced Rounds of SHACAL-2[C]//Proceedings of ACISP2004: LNCS3108. Berlin: Springer-Verlag, 2004: 110-122.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部