期刊文献+

变形ARIA密码算法的新攻击

New Attacks on a Variant ARIA Cipher
下载PDF
导出
摘要 ARIA密码是韩国官方公布的分组密码标准算法,其分组长度为128比特,支持128比特、192比特、256比特3种密钥长度.该文检验变形ARIA,即采用相同S盒的ARIA算法抵抗中间相遇攻击的能力.利用ARIA算法结构,分别构造4、5、6轮变形ARIA的相遇区分器,并由此给出7轮ARIA-192、8轮ARIA-192、9轮ARIA-256的新攻击.结果表明,如果ARIA密码算法采用相同的S盒,那么其安全性将明显降低.该文还进一步说明:如果分组密码算法的非线性层与线性层组合不当,在采用时空折中方法时往往可打破数据复杂度和预处理时间复杂度等量交换的瓶颈,进而提高攻击效率. ARIA cipher is a standard block cipher published by South Korean. Its block size is 128 bits and supports three key lengths: 128 bits, 192 bits, and 256 bits. In this paper, the security of a variant ARIA cipher using the same S boxes against the meet-in-the-middle attack is examined. Based on the structure of the cipher, we design 4-round, 5-round, and 6-round distinguishers, respectively. Moreover, some new attacks on 7-round ARIA-192, 8-round ARIA-192, and 9-round ARIA-256 are proposed. It is shown that the security of ARIA will be reduced significantly if the cipher only uses a nonlinear S box. Furthermore, if the linear and nonlinear layers are not properly combined, one can break the equivalent tradeoff between the dada complexity and the preprocess time complexity under a dada-time-memory tradeoff attack. In this case, a more effective attack may be obtained.
出处 《应用科学学报》 CAS CSCD 北大核心 2013年第6期650-654,共5页 Journal of Applied Sciences
基金 国家自然科学基金(No.61100185) 广西自然科学基金(No.2011GXNSFB018071) 广西无线宽带通信与信号处理重点实验室(桂林电子科技大学)主任基金(No.11101) 保密通信重点实验室基金(No.9140C110404110C1106) 中国博士后科学基金(No.2011M500419)资助
关键词 分组密码 ARIA算法 中间相遇攻击 时间复杂度 block cipher, ARIA cipher, meet-in4he-middle attack, time complexity
  • 相关文献

参考文献18

  • 1DAESUNG K, AESUNG K, SANGWOO P, SOOHAK S, YAEKWON S, JUNGHWAN S, YONGJIN Y, EJOONC Y, SANGJIN L, JAEON L, SEONGTAEK C, DAEWAN H, JIN H. New block cipher: ARIA [C]//Information Secu- rity and Cryptology-ICISC 2003, 2004: 432-445.
  • 2NIST. Advanced encryption standard(AES) [OL]. [2011-11-17]. http://csrc.nist.gov/publications/fips /fips197/Fips-197.pdf. November 26, 2001.
  • 3DAEMEN J, RIJNMEN V. The design of rijndael AES: the advanced encryption standard [M]. Berlin: Springer-Verlag, 2002: 30-45.
  • 4BIRYUKOV A, CANNIERE C, LANO J, PRENEEL B, ORS S. Security and performance anal- ysis of ARIA. version 1.2lOLl. [2011-11-17]. http://cloud.ttongfly.net/t/attachment/1321529635. pdf, January 7, 2004.
  • 5吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:22
  • 6LI S H, SONG C Y. Improved impossible differen- tial cryptanalysis of ARIA [C]//Information Security and Assurance, 2008: 129-132.
  • 7Du C H, CHEN J Z. Impossible differential cryptanal- ysis of ARIA reduced to 7 rounds [C]//Cryptology and Network Security, 2010: 20-30.
  • 8LI S H, ZHANG H N, WANG X V. Dedicated linear attack on ARIA version 1.0 [J]. Tsinghua Science and Technology, 2009, 14(2): 212-217.
  • 9L1 Y J, Wu W L, ZHANG L. Integral attacks on reduced-round ARIA block cipher [C]//Information Security, Practice and Experience, 2010: 19-29.
  • 10TANG X H, SUN B, LI R L, LI C. A meet-in-the- middle attack on reduced-round ARIA [J]. Journal of Systems and Software, 2011, 84(10): 1685-1692.

二级参考文献12

  • 1吴文玲.Pseudorandomness of Camellia-Like Scheme[J].Journal of Computer Science & Technology,2006,21(1):82-88. 被引量:6
  • 2吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:22
  • 3Kwon D, Kim J, and Park S, et al.. New block cipher: ARIA[C]. ICISC 2003, LNCS 2971: 432-445.
  • 4Biryukov A, Canniere D C, and Lano J, et al.. Security and performance analysis of ARIA. Version 1.2. Dept. Electrical Engineering-ESAT/S CD-COSIC Katholieke Universiteit Leuven Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium Jan. 7. 2004.
  • 5Fleischmann E, Gorski M, and Lucks S. Attacking reduced rounds of the ARIA block cipher. Cryptology ePrint Archive: Report 2009/334, http://eprint.iacr.org/2009/334. 2009.
  • 6Fleischmann E, Forler C, and Gorski M, et al.. New boomerang attacks on ARIA[C]. INDOCRYPT 2010, LNCS 6498: 163-175.
  • 7Li Yan-jun, Wu Wen-ling, and Zhang Lei. Integral attacks on reduced-round ARIA block cipher[C]. ISPEC 2010, LNCS 6047: 19-29.
  • 8Tang Xue-hai, Sun Bing, and Li Rui-lin, et al.. A meet-in- the-middle attack on ARIA. Cryptology ePrint Archive:Report 2010/168, http://eprint.iacr.org/2010/168. 2010.
  • 9Demirci H, Selcuk A A, and Ture E. A new meet-in-the- middle attack on the IDEA Block Cipher[C]. SAC 2003, LNCS 3006: 117-129.
  • 10Demirci H and Selcuk A A. A meet-in-the-middle attack on 8-round AES[C]. FSE 2008, LNCS 5086: 116-126.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部