期刊文献+

3D密码的Square攻击 被引量:14

Square Attacks on 3D Cipher
下载PDF
导出
摘要 3D密码是CANS2008提出的新的分组密码算法,与以往的分组密码算法不同,该密码采用3维结构。该文根据3D密码的结构特性,得到了3D密码的5.25轮和6.25轮新的Square区分器,重新评估了其抗Square攻击的强度。攻击结果表明:新区分器对6轮3D密码攻击的数据复杂度和时间复杂度比已有的结果好,并且还可应用到7轮,8轮和9轮的3D密码攻击中。 3D cipher is a new block cipher proposed in CANS 2008. It is different from all known block cipher as it uses the three dimension structure. According to the structure properties of 3D cipher, a new 5.25-round and a new 6.25-round square distinguishers are presented, and the square attacks on reduced- round 3D are improved. Attacking results demonstrate that 6-round attack is better than the known square attacks in data complexity and time complexity. Moreover, these two new distinguishers can be applied to 7/8/9-round 3D cipher.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第1期157-161,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60803156) 东南大学移动通信国家重点实验室开放基金(w200807)资助课题
关键词 分组密码 3D密码 SQUARE攻击 Block cipher 3D cipher Square attack
  • 相关文献

参考文献9

  • 1Nakahara Jr J. A three-dimensional block cipher. CANS 2008, Lecture Notes in Computer Science, 2008, Vol. 5339: 252-267.
  • 2Daemen J and Rijmen V. AES Proposal: Rijndeal. http:// www.cryptolounge,org/wiki/AES _Proposah_ Rijndael, 1998, 08.
  • 3Daemen J, Knudsen L, and Rijmen V. The block cipher Square. FSE1997, Lecture Notes in Computer Science, Springer- Verlag, 1997, Vol. 1267: 149-165.
  • 4Lucks S. The saturation attack-a bait for twofish. FSE2002, Lecture Notes in Computer Science, Springer-Verlag, 2002, Vol. 2335: 1-15.
  • 5Ferguson N, Kelsey J, and Lucks S, et al.. hnproved cryptanalysis of Rijndeal. FSE2000, Lecture Notes in Computer Science, Springer-Verlag, 2001, Vol, 1978: 213-230.
  • 6Duo Lei, Li Chao, and Feng Ke-qin. Square like attack on Camellia. ICICS2007, Lecture Notes in Computer Science, Springer-Verlug, 2007, Vol. 4861: 269-283.
  • 7王薇,王小云.对CLEFIA算法的饱和度分析[J].通信学报,2008,29(10):88-92. 被引量:11
  • 8Muhammad Reza Z'aba, Havard Raddum, and Matt Henricksen, et al.. Bit-pattern based integral attack. FSE2008 Lecture Notes in Computer Science, Springer-Verlag, 2008, Vol. 5086: 363-381.
  • 9Barreto P and Rijmen V. The ANUBIS Block Cipher. http:// www.sciencecentral.com/site/497719, 2000, 06.

二级参考文献9

  • 1DAEMEN J, KNUDSEN L R, RLIMEN V. The block cipher SQUARE[A]. FSE 1997[C]. LNCS 1267, 1997, 149-165.
  • 2SCHNEIER B, KELSEY J, WHIT/NG D, et al. The Twofish Encryption Algorithm: A 128-bit Block Cipher[M]. John Wiley & Sons, ISBN 0-471-35381-7, USA, 1999.
  • 3LUCKS S. The saturation attack-a bait for twofish[A]. FSE 2001[C]. Japan, LNCS 2355, 2002.1-15.
  • 4SHIRAI T, SHIBUTANI K, AKISHITA T, et aL The 128-bit blockcipher CLEFIA[A]. FSE 2007[C].Luxembourg, LNCS 4593, 2007. 181-195.
  • 5SONY Corporation. The 128-blt blockcipher CLEFIA: algorithm specification [EB/OL]. http://www.sony.net/Products/clefia/technical/ data/clefia-spec- 1.0.pdf. 2007.
  • 6SONY Corporation. The 128-bit blockcipher CLEFIA: security and performance evaluations [EB/OL]. http://www.sony.net/Products/clefia/technical/data/clefia-eval- 1.0.pdf. 2007.
  • 7TSUNOO Y, TSUJIHARA E, SHIGERI M, et al. Impossible differential cryptanalysis of CLEFIA[A]. FSE 2008[C]. Switzerland, LNCS 5086, 2008. 398-411.
  • 8WANG W, WANG X Y. Improved impossible differential cryptanalysis of CLEFIA[EB/OL]. http://eprint.iacr.org/2007/466.2007.
  • 9FERGUSON N, KELSEY J, LUCKS S, et al. Improved cryptanalysis of Rijndael[A]. FSE 2000[C]. USA, LNCS 1978, 2001. 213-230.

共引文献10

同被引文献114

  • 1陈华,吴文玲,冯登国.提高S盒非线性度的有效算法[J].计算机科学,2005,32(10):68-70. 被引量:4
  • 2李清玲,李超.变种Camellia对Square攻击的安全性[J].应用科学学报,2006,24(5):485-490. 被引量:2
  • 3张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 4Daemen J, Knudsen L R, and Rijmen V. The block cipher SQUARE[C]. FSE 1997, Springer-Verlag, 1997, LNCS, 1267: 149-165.
  • 5Duo L, Li C, and Feng K. New observation on Camellia[C]. SAC 2005, Springer-Verlag, 2006, LNCS, 3897: 51-64.
  • 6Zhang P, Sun B, and Li C. Saturation attack on the block cipher HIGHT[C]. CANS 2009, Springer-Verlag, 2009, LNCS, 5888: 76-86.
  • 7Lee C, Jun K, and Jung M, et al.. Zodiac version 1.0 (revised) architecture and specification. Standardization Workshop on Information Security Technology, Korean Contribution on MP18033, ISO/IEC JTC1/SC27 N2563, 2000. http://www. kisa. or. kr/seed/index, html.
  • 8Hong D, Sung J, and Moriai S, et al.. Impossible differential cryptanalysis of Zodiac[C]. FSE 2001, Springer-Verlag, 2002, LNCS, 2355: 300-311.
  • 9Ji W and Hu L. Square attack on reduced-round Zodiac cipher[C]. ISPEC 2008, Springer- Verlag, 2008, LNCS, 4991: 377-391.
  • 10Bar-EI Hagai. Introduction to side channel attacks [ EB/OL]. [2009-07-161]. http: //www. discretix, com/PDF/Introduction% 20to% 20Side% 20Channe1% 20Attacks. pdf.

引证文献14

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部