期刊文献+

基于仿射非正型σ变换的Lai-Massey模型的密码学缺陷 被引量:1

The Cryptographic Weakness of Lai-Massey Scheme with an Affine but not Orthomorphic Bijection σ
下载PDF
导出
摘要 Vaudenay(1999)从伪随机性的角度出发,证明了Lai-Massey模型中的σ变换应设计为正型置换或几乎正型置换。该文从抗差分攻击和线性攻击的角度重新考察了Lai-Massey模型双射σ的设计问题。证明了基于任意有限交换群设计的Lai-Massey模型,如果σ变换设计为该群上的仿射变换,则必须为正型置换,否则该算法将分别存在概率为1的差分对应和线性逼近,结论表明仿射的几乎正型置换并不适用于Lai-Massey模型的设计。此外,该文借助有限群的特征标引入了一种新的线性逼近方式,收集和刻画了一般有限交换群上Lai-Massey模型输入和输出的线性逼近关系。 Vaudenay (1999) proved that the permutationσin Lai -Massey scheme should be an orthomorphism or almost orthomorphism. This paper mainly focuses on the principle of the functionsin Lai-Massey scheme, which is described by its resistance to differential and linear attack. It shows that no matter how the group G is defined, if sis an affine function on G, then it should be defined as an orthomorphism, or else there exists a differentially characteristic with probability 1 and a linearly approximation with correlation coefficient 1, therefore it has potential security risk. Moreover, by the characteristic spectrum in finite group, a new linear relationship between the input and output of Lai-Massey scheme is introduced, which is used to describe the linear relationship lying between the input and the output of Lai-Massey scheme.
出处 《电子与信息学报》 EI CSCD 北大核心 2013年第10期2536-2540,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61272488)资助课题
关键词 密码学 有限交换群 差分分析 线性分析 Lai—Massey模型 正型置换 Cryptography Finite a-bel group Differentially cryptanalysis Linearly cryptanalysis Lai-Masseyscheme Orthomorphism
  • 相关文献

参考文献3

二级参考文献41

  • 1董晓丽,胡予濮,韦永壮,陈杰.A New Method for Meet-in-the-Middle Attacks on Reduced AES[J].China Communications,2011,8(2):21-25. 被引量:3
  • 2吴文玲,卫宏儒.低轮FOX分组密码的碰撞-积分攻击[J].电子学报,2005,33(7):1307-1310. 被引量:11
  • 3JUNOD P,VAUDENAY S.FOX:a new family of block ciphers[A].Selected Areas in Cryptography-SAC 2004[C].Waterloo,Canada.,2004.114-129.
  • 4VAUDENAY S.On the lai-massey scheme[A].Advances in Cryptol-ogy-Asiacrypt'99[C].1999.8-19.
  • 5JUNOD P,VAUDENAY S.Perfect diffusion primitives for block ciphers-building efficient MDS matrices[A].Selected Areas in Cryptography-SAC 2004[C].Waterloo,Canada,2004.84-99.
  • 6WU W L,ZHANG W T,FENG D G.Integral cryptanalysis of reduced fox block cipher[A].ICISC 2005[C].Beijing,China,2005.229-241.
  • 7WU W L,ZHANG L,ZHANG W T.Improved impossible differential cryptanalysis of reduced-round camellia[A].Selected Areas in Cryp-tography-SAC 2008[C].New Brunswick,Canada.2008.442-456.
  • 8TSUNOO Y,TSUJIHARA E,SHIGERI M,et al.Impossible differen-tial cryptanalysis of CLEFIA[A].Fast Software Encryption-FSE 2008[C].2008.398-411.
  • 9HONG D,SUNG J,MORIAI S,et al.Impossible differential cryp-tanalysis of zodiac[A].Fast Software Encryption-FSE 2001[C].Yo-kohama,Japan,2001.300-311.
  • 10MINIER M.An integral cryptanalysis against a five rounds version of FOX[A].Western European Workshop on Research in Cryptology 2005[C].2005.98-103.

共引文献15

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部