Differential Collision Attack on Reduced FOX Block Cipher
被引量:5
Differential Collision Attack on Reduced FOX Block Cipher
基金
This work has been performed in the Project "The Research on the New Analysis in Block Ciphers" supported by the Fundamental Research Funds for the Central Universities of China,the National Natural Science Foundation of China,the 111 Project of China,the Scientific Research Foundation of Education Department of Shaanxi Provincial Government of China
参考文献20
-
1JUNOD P, VAUDENAY S. FOX: A New Family of Block Ciphers [C]// Proceedings of the 11th International Workshop, SAC 2004: August 9-10, 2004, Waterloo, Canada. Springer-Verlag, LNCS, 2005, 3357: 114-129.
-
2LAI Xuejia, MASSEY J. A Proposal for a New Block Encryption Standard [C]// Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Advances in Cryptology: May 21-24, 1990, Aarhus, Denmark. Springer-Verlag, LNCS, 1991, 473: 389-404.
-
3VAUDENAY S. On the Lai-Massey Scheme[C]//Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology: November 14-18, 1999, Singapore. Springer-Verlag, LNCS 1999, 1716: 8-19.
-
4BIHAM E, BIRYUKOV A, SHAMIR A. Enhancing Differential-Linear Cryptanalysis[C]//Prodeedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, Advances in Cryptology: December 1-5, 2002, New Zealand. Springer-Verlag, LNCS, 2002, 2501: 587-592.
-
5MINIER M. An Integral Cryptanalysis Against a Five Rounds Version of FOX[C]//Proceedings of the Western European Workshop on Research in Cryptography: July 5-7, 2005, Leuven, Belgium.
-
6WAGNER D. The Boomerang Attack[C]//Proceedings of the 6th International Workshop, Software Encryption: March 24-26, 1999, Rome, Italy. Springer-Verlag, LNCS, 1999, 1636: 156-170.
-
7BIHAM E, DUNKELMAN O, KELLER N. The Rectangle Attack-Rectangling the Serpent[C]//Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology: May 6-10, 2001, Irmsbruck, Austria. Springer-Verlag, LNCS, 2001, 2045: 340-357.
-
8KNUDSEN L. Truncated and Higher Order Differentials[C]// Proceedings of the Second International Workshop, Fast Soft-ware Encryption: December 14-16, 1994, Leuven, Belgium. Springer-Verlag, LNCS, 1995, 1008: 196-211.
-
9BIHAM E, BIRYUKOV A, SHAMIR A. Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials[C]// Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology: May 2-6, 1999, Prague, Czech Republic. Springer-Verlag LNCS, 1999, 1592: 12-23.
-
10HARPES C, MASSEY J. Partitioning Cryptanalysis[C]// Proceedings of the 4th International Workshop, FSE'97: January 20-22, 1997, Haifa, Israel. Springer-Verlag, LNCS, 1997, 1267: 13-27.
二级参考文献21
-
1P Junod,S Vaudenay. FOX:a new family of block ciphers[A].Selected Areas in Cryptography-SAC 2004[C]. Berlin: Springer-Verlag, 2004.131 - 146.
-
2Mediacrypt AG[EB/OL] .http://www.mediacrypt.com
-
3X Lai,J Massey. Aproposal for anewblock encryption standard[A].Advances in Cryptology-EUROCRYPT' 90[C]. Berlin: Springer-Verlag, 1991.389 - 404.
-
4S Vaudenay. On the lai-massey scheme[A]. Advances in Cryptology-ASIACRYPT' 99[C]. Berlin: Springer-Verlag, 1999.8 - 19.
-
5E Biham, A Biryukov, A Shamir. Enhancing differential-linear cryptanalysis [A]. Advances in Cryptology-ASIACRYPT' 02 [C]. Berlin:Springer-Verlag, 2002.254 - 266.
-
6LKnudsen. Truncated and higher order differentials[A] .Fast Software Encryption-FSE' 95 [C]. Berlin: Springer-Verlag, 1995.196 - 211.
-
7E Biham, A Biryukov, A Shamir. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials [A]. Advances in Cryptology-EUROCRYPT' 99[C]. Berlin: Springer-Verlag, 1999.12 - 23.
-
8N Courtois,J Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations [A]. Advances in Cryptology-ASIACRYPT' 02[C]. Berlin: Springer- Verlag, 2002.267-287.
-
9A Biryukov, D Wagner. Slide attacks[A]. Fast Software Encryption-FSE' 99 [C]. Berlin: Springer-Verlag, 1999.245 - 259.
-
10A Biryukov, D Wagner. Advanced slide attacks[A]. Advances in Cryptology-EUROCRYPT' 00 [C], Berlin: Springer-Verlag, 2000. 589 -606.
共引文献11
-
1魏悦川,孙兵,李超.FOX密码的不可能差分攻击[J].通信学报,2010,31(9):24-29. 被引量:7
-
2魏悦川,孙兵,李超.对Rijndael-256算法新的积分攻击[J].电子学报,2011,39(2):476-480. 被引量:3
-
3付立仕,金晨辉.基于仿射非正型σ变换的Lai-Massey模型的密码学缺陷[J].电子与信息学报,2013,35(10):2536-2540. 被引量:1
-
4于晓丽,吴文玲,李艳俊.低轮MIBS分组密码的积分分析[J].计算机研究与发展,2013,50(10):2117-2125. 被引量:19
-
5刘青,卫宏儒,潘伟.Zodiac算法的碰撞攻击[J].计算机应用,2014,34(1):73-77. 被引量:3
-
6卫宏儒,刘青.FOX密码的中间相遇攻击[J].计算机应用与软件,2014,31(3):286-291.
-
7郭瑞,金晨辉.Lai-Massey结构伪随机特性研究[J].电子与信息学报,2014,36(4):828-833. 被引量:2
-
8杨斐,彭鹏.基于AES的可重构加密系统的FPGA设计[J].微型机与应用,2014,33(24):2-4. 被引量:2
-
9邱丰品,卫宏儒,潘锦航.对简化轮数的SNAKE(2)算法的碰撞攻击[J].计算机科学,2015,42(9):147-150.
-
10凡如亚,金晨辉,崔霆.Lai-Massey结构平均差分概率和平均线性链概率的上界估计[J].电子与信息学报,2018,40(12):2986-2991.
同被引文献9
-
1董晓丽,胡予濮,韦永壮,陈杰.一种新的简化AES中间相遇攻击方法(英文)[J].China Communications,2011,8(2):21-25. 被引量:3
-
2吴文玲,卫宏儒.低轮FOX分组密码的碰撞-积分攻击[J].电子学报,2005,33(7):1307-1310. 被引量:11
-
3魏悦川,孙兵,李超.FOX密码的不可能差分攻击[J].通信学报,2010,31(9):24-29. 被引量:7
-
4唐学海,孙兵,李超.对8轮CLEFIA算法的一种现实攻击[J].电子学报,2011,39(7):1608-1612. 被引量:6
-
5魏悦川,孙兵,李超.对简化轮数的SNAKE(2)算法的中间相遇攻击[J].计算机工程与科学,2012,34(6):28-31. 被引量:5
-
6金晨辉.有限域和剩余类环上非奇异反馈多项式的谱刻划[J].通信学报,2000,21(1):74-77. 被引量:7
-
7海昕,唐学海,李超.对Zodiac算法的中间相遇攻击[J].电子与信息学报,2012,34(9):2259-2262. 被引量:8
-
8郭瑞,金晨辉.低轮FOX64算法的零相关-积分分析[J].电子与信息学报,2015,37(2):417-422. 被引量:4
-
9伊文坛,陈少真.Fox密码的多维零相关线性分析[J].密码学报,2015,2(1):27-39. 被引量:7
引证文献5
-
1付立仕,金晨辉.基于仿射非正型σ变换的Lai-Massey模型的密码学缺陷[J].电子与信息学报,2013,35(10):2536-2540. 被引量:1
-
2卫宏儒,刘青.FOX密码的中间相遇攻击[J].计算机应用与软件,2014,31(3):286-291.
-
3郭瑞,金晨辉.Lai-Massey结构伪随机特性研究[J].电子与信息学报,2014,36(4):828-833. 被引量:2
-
4郭瑞,金晨辉.低轮FOX64算法的零相关-积分分析[J].电子与信息学报,2015,37(2):417-422. 被引量:4
-
5李荣佳,金晨辉.FOX算法的中间相遇攻击[J].通信学报,2016,37(8):185-190. 被引量:1
二级引证文献6
-
1李云强,张小勇,王爱兰.AES-128 Biclique结构的分布特征[J].电子与信息学报,2016,38(1):135-140. 被引量:2
-
2白淑君,张欣.一类正形置换的差分分析[J].通信技术,2016,49(7):896-901.
-
3李荣佳,金晨辉.FOX算法的中间相遇攻击[J].通信学报,2016,37(8):185-190. 被引量:1
-
4刘庆聪,赵亚群,马猛,刘凤梅.MIBS密码的零相关—积分攻击[J].通信学报,2016,37(11):189-195.
-
5凡如亚,金晨辉,崔霆.Lai-Massey结构平均差分概率和平均线性链概率的上界估计[J].电子与信息学报,2018,40(12):2986-2991.
-
6刘亚,占婷婷,姒宏明,李玮,刘志强.改进的10轮Kalyna-128/256中间相遇攻击[J].计算机应用研究,2020,37(7):2112-2116.
-
1WUWenling FENGDengguo.Collision attack on reduced-round Camellia[J].Science in China(Series F),2005,48(1):78-90. 被引量:7
-
2梁杰,来学嘉.Improved Collision Attack on Hash Function MD5[J].Journal of Computer Science & Technology,2007,22(1):79-87. 被引量:12
-
3CHEN Shuai,ZHONG XianXin,WU ZhengZhong.Chaos block cipher for wireless sensor network[J].Science in China(Series F),2008,51(8):1055-1063. 被引量:6
-
4TANG YuChen,ZENG Guang,HAN WenBao.Classification of disturbance vectors for collision attack in SHA-1[J].Science China(Information Sciences),2015,58(11):99-108. 被引量:4
-
5苏波展,吴文玲,张文涛.Security of the SMS4 Block Cipher Against Differential Cryptanalysis[J].Journal of Computer Science & Technology,2011,26(1):130-138. 被引量:15
-
6ZHANG WenYing,LI YanYan,WU Lei.A new one-bit diFFerence collision attack on HAVAL-128[J].Science China(Information Sciences),2012,55(11):2521-2529.
-
7LUO Yuan(Department Of Mathematics, Nankai University, Tiajin 300071, China)ZHANG Zhaozhi(Institute of Systems Science, Academia Silica, Beijing 100080, China).NEURAL NETWORK MODELS FOR DESIGN OF BLOCK CIPHER SYSTEM[J].Systems Science and Mathematical Sciences,1998,11(2):161-167.
-
8LIU Zhiqiang GU Dawu ZHANG Jing.Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher[J].Chinese Journal of Electronics,2010,19(3):389-393. 被引量:7
-
9Gao-Li Wang.Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD[J].Journal of Computer Science & Technology,2013,28(1):129-143. 被引量:3
-
10WANG An,WANG ZongYue,ZHENG XueXin,WANG XiaoMei,CHEN Man,ZHANG GuoShuang,WU LiJi.Efficient collision attacks on smart card implementations of masked AES[J].Science China(Information Sciences),2015,58(5):93-107. 被引量:2