期刊文献+

SNAKE(2)算法新的Square攻击 被引量:1

New Square Attack on SNAKE(2)
下载PDF
导出
摘要 重新评估了分组密码SNAKE(2)算法抵抗Square攻击的能力。指出文献[4]中给出的基于等价结构的错误5轮Square区分器。综合利用算法原结构与其等价结构,给出了一个新的6轮Square区分器。利用新的区分器,对不同轮数的SNAKE(2)算法应用了Square攻击来恢复部分等价密钥信息,7轮、8轮、9轮SNAKE(2)算法的Square攻击时间复杂度分别为212.19、221.59、230.41次加密运算,数据复杂度分别为29、29.59、210选择明文。攻击结果优于文献[4]中给出的Square攻击。 The security of block cipher SNAKE (2) against Square attacks was re-evaluated.The wrong 5-round Square distinguisher based on equivalent structure given in paper [4] was pointed out.A new 6-round Square distinguisher based on both the structure of SNAKE (2) and its equivalent structures was proposed.Using the new 6-round Square distinguisher,Square attack was applied to 7,8,9-round SNAKE(2) to recover some information of the equivalent key.The time complexities are 212.19,221.59,230.41 respectively,and the data complexities are 29,29.59,210 respectively.The results are better than the Square attack given by paper[4].
出处 《计算机科学》 CSCD 北大核心 2014年第3期169-171,180,共4页 Computer Science
基金 信息安全国家重点实验室2011年开放课题(02-04-3) 内蒙古自治区科技创新引导奖励资金(2012)资助
关键词 SNAKE SQUARE攻击 区分器 复杂度 SNAKE Square attack Distinguisher Complexity
  • 相关文献

参考文献12

  • 1Lee C,Cha Y.The Block Cipher:SNAKE with Provable Resistance against DC and LC attacks 1997[C] //Proceedings of 1997Korea-Japan Joint Workshop on Information Security and Cryp-tology (JWISC'97).1997:3-17.
  • 2Moriai S,Shimoyama T,Kaneko T.Interpolation attacks of the block cipher:SNAKE 1999[J].Lecture Notes in Computer Science,Fast Software Encryption,1999,1636:275-289.
  • 3Sun B,Qu L,Li C.Impossible Differential Cryptanalysis of SNAKE-2 2009[C] // International Conference on IEEE Networks Security,Wireless Communications and Trusted Computing,2009.2009,2:63-66.
  • 4张鹏,孙兵,李超.对特殊类型Feistel密码的Square攻击[J].国防科技大学学报,2010,32(4):137-140. 被引量:3
  • 5魏悦川,孙兵,李超.对简化轮数的SNAKE(2)算法的中间相遇攻击[J].计算机工程与科学,2012,34(6):28-31. 被引量:5
  • 6Daemen J,Knudsen L R,Rijmen V.The block cipher SQUARE[J] // Lecture Notes in Computer Science,Fast Software Encryption,1997,1267:149-165.
  • 7Lei D,Chao L,Feng K.New observation on Camellia[J].Lecture Notes in Computer Science,Selected Areas in Cryptography,2006,3897:51-64.
  • 8唐学海,李超,谢端强.CLEFIA密码的Square攻击[J].电子与信息学报,2009,31(9):2260-2263. 被引量:6
  • 9王美一,唐学海,李超,屈龙江.3D密码的Square攻击[J].电子与信息学报,2010,32(1):157-161. 被引量:14
  • 10Zhang P,Sun B,Li C.Saturation attack on the block cipher HIGHT[C] //Proceeding of the 8th International Conference on Crytology and Network Security.2009:76-86.

二级参考文献56

  • 1陈华,冯登国,吴文玲.一种改善双射S盒密码特性的有效算法[J].计算机研究与发展,2004,41(8):1410-1414. 被引量:10
  • 2Shirai T, Shibutani K, Akishita T, Moriai S, and Iwata T. The 128-bit block cipher CLEFIA [C]. Fast Software Encryption 2007, Springer, Heidelbeng , 2007, Vol. 4593: 181-195.
  • 3Sony Corporation. The 128-bit Blockcipher CLEFIA: Algorithm Specification. Revision 1.0 June 1, 2007.
  • 4Sony Corporation. The 128-bit Blockcipher CLEFIA: Security and Performance Evaluation. Revision 1.0 June 1, 2007.
  • 5Biham E and Shamir A. Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991, 4(1): 3-72.
  • 6Matsui M. Linear cryptanalysis of the data encryption standard[C]. Proceedings of Eurocrypt' 93, Springer-Verlag,1994, LNCS 765: 386-397.
  • 7Langford S K and Hellman M E. Differential-linear cryptanalysis[C]. Proceedings of Crypto' 94, Springer- Verlag, 1994, LNCS 839: 17-25.
  • 8Knudsen L R. Truncated and higher order differentials[C]. Fast Software Encryption: Second International Workshop, Springer-Verlag, 1994, LNCS1008: 196-211.
  • 9Biham E, Biryukov A, and Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]. Proceedings of Eurocrypt' 99, Springer- Verlag, 1999, LNCS 1592: 12-23.
  • 10Daemen J, Knudsen L, and Rijmen V. The block cipher square[C]. Fast Software Encryption 1997, Springer-Verlag, 1997, LNCS 1267: 149-165.

共引文献31

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部