期刊文献+

(2n,r,t)_GFNSP结构一类不可能差分对的构造方法

A Construction Method of Impossible Difference for(2n,r,t)_GFNSP Overall Structure
下载PDF
导出
摘要 构造不可能差分对是进行不可能差分分析的前提。该文研究了(2n,r,t)_GFNSP结构不可能差分对的构造问题,给出了该结构的一类(4n+1)轮不可能差分对的结构形式以及计算复杂度为O(n2r10)的构造算法,针对Shirai等提出的(2n,r,t)_GFNSP结构的DSM设计策略,本文给出了相应的(4n+1)轮不可能差分对的构造方法。 Impossible differential attack should be launched with the construction of impossible difference.This paper investigates the construction method of impossible differences for(2n,r,t)_GFNSP overall structure.A kind of(4n+1)-round impossible differences and the construct method with computation complexity O(n2r10) are presented.And this paper provides the structure of(4n+1)-round impossible differences against the DSM strategy which is proposed by Shirai et al..
作者 崔霆 金晨辉
出处 《电子与信息学报》 EI CSCD 北大核心 2011年第1期194-198,共5页 Journal of Electronics & Information Technology
关键词 分组密码 (2n r t)_GFNSP结构 不可能差分对 扩散结构 分支数 Block cipher (2n r t)_GFNSP overall structure Impossible difference Diffusion layer Branch number
  • 相关文献

参考文献12

  • 1Biham E, Biryukov A, and Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]. EUROCRYPT 1999, LNCS 1592: 12-23.
  • 2Zhang Wen-tao, Wu Wen-ling, and Zhang Lei, et al.. Improved related-key impossible differential attacks on reduced-round AES-192[C]. Proceedings of Selected Areas in Cryptography 2006, LNCS 4356: 15-27.
  • 3Wu Wen-ling, Zhang Wen-tao, and Feng Deng-guo Impossible differential cryptanalysis of reduce round ARIA and Camellia[J]. Journal of Computer Science an1 Technology, 2007, 22(3): 449-456.
  • 4Tsunoo Y, Tsujihara E, and Shigeri M, et al.. Impossible differential cryptanalysis of CLEFIA. FSE2008, LNCS 5086: 398- 411.
  • 5Sun Bing, Li Rui-lin, and Wang Mian, et al.. Impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report, 2008: 151.
  • 6Wang Wei and Wang Xiao-yun. Improved impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report, 2007: 466.
  • 7Wu Wen-ling, Zhang Lei, and Zhang Li-ting, et al.. Security analysis of the GF-NLFSR structure and four-cell Block Cipher[C]. ICICS 2009, LNCS 5927: 17-31.
  • 8Li Rui-lin, Sun Bing, and Li Chao. Distinguishing attacks on a kind of generalized unbalanced feistel network. Cryptology ePrint Archive, Report, 2009: 360.
  • 9Zheng Y, Matsumoto T, and Imai H. On the construction of block ciphers provably secure and not relying on any unproved hypotheses[C]. CRYPTO 1989, LNCS 435: 461-480.
  • 10Shiral T and Preneel B. On Feistel ciphers using optimal diffusion mappings across multiple roundsfC]. ASIACRYPT 2004, LNCS 3329: 1-15.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部