期刊文献+

基于Luffa杂凑函数的旋转攻击

Rotational attack on Luffa hash function
下载PDF
导出
摘要 针对Luffa杂凑函数抗旋转攻击的能力进行了研究,通过分析Luffa置换的特点,定义了针对Luffa置换的旋转对,给出了基本字变换对旋转关系的影响,证明了"与"和"或"运算对旋转关系影响的等效性,提出了缩减轮Luffa置换与随机置换的区分算法。理论分析和实验结果均表明,3轮Luffa置换难以抵抗旋转攻击,攻击的计算复杂度仅为216。 This paper studied the capacity of resisting rotational attack of Luffa hash function. Through analyzing characteristics of Luffa permutation, it defined the rotational pair of Luffa permutation, gave the influence of basic word transformations to rotational relation, proved that the AND operation and the OR operation had the same influence on rotational relation, and presented the distinguisher algorithm between round-reduced Luffa permutation and a random permutation. Theoretical analysis and experiment results show that 3 round Luffa permutation can' t resist rotational attack and the attack complexity is only 2^16.
出处 《计算机应用研究》 CSCD 北大核心 2013年第12期3807-3809,3869,共4页 Application Research of Computers
关键词 Luffa杂凑函数 SHA3候选算法 旋转攻击 区分攻击 Luffa hash function SHA3 candidate algorithms rotational attack distinguisher attack
  • 相关文献

参考文献12

  • 1De CANNIERE C,SATO H,WATANABE D.Hash function Luffa:specification submission to NIST(round I)[EB/OL]? 2008(2008-10-31).http://ehash.iaik.tugraz.at/wiki/Luffa.
  • 2De CANNIERE C,SATO H,WATANABE D.Hash function Luffa:specification submission to NIST(round 2)[EB/OL].2009(2009-09-28).http;//ehash.iaik.tugraz.at/wiki/Luffa.
  • 3KHOVRATOVICH D,NIKOLIC I.Rotational cryptanalysis of ARX[C]//Proc of the 17th International Workshop on Fast SoftwareEncryption.Berlin:Springer-Verlag,2010:333-346.
  • 4KHOVRATOVICH D,NIKOLIC I,RCHBERGER C.Rotational re-bound attacks on reduced Skein[C]//Proc of the 16th InternationalConference on Theory and Application of Cryptology and InformationSecurity.2010:1-19.
  • 5ALIZADEH J,MIRGHADHI A.A new distinguisher for CubeHash-8/D and CubeHasIi-15/b compression functions[J].IJCSI Internatio-nal Journal of Computer Science Issues,2011,8(5):184-192.
  • 6MORAWIECKI IjJmEPRZYK.!,SREBRNY R.Rotational ciyptanaly-sis of round-reduced KECCAK[EB/OB].(2012-12-18).http://eprint.iacr.org/2012/546.
  • 7WATANABE D,HATANO Y.Higher order differential attack on re-duced round Luffa[R/OB].(2010-11-19).http://eprint.iacr.org/2010/589.
  • 8KHOVRATOVICH D,NAYA-PLASENCIA M,ROCK,et al.Crypta-nalysis of Luffa v2 components[C]//Proc of the 17 th InternationalConference on Selected Areas in Cryptography.Berlin:Springer-Ver-lag,2011:388-409.
  • 9JIA Ke-ting,DESMEDT Y,HAN Li-dong,et al.Pseudo-cryptanalysisof Luffa[R/OB].(2009-05-19).http://eprint.iacr.org/2009/224.
  • 10PRENEEL B,YOSHIDA H,WATANABE D.Finding collisions for re-duced Luffa-256 v2[C]//Proc of the 16th Australasian Conferenceon Information Security and Privacy.2011:423-427.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部