期刊文献+

三类循环移位变换对旋转攻击的影响

Effects of three kinds of cyclic shift transformation to rotational attack
下载PDF
导出
摘要 针对三类循环移位变换对旋转攻击性能的影响进行了研究,利用概率知识证明了等字间的循环移位变换不影响旋转攻击的攻击方式和效率,给出了多字间的循环移位变换和子字间的循环移位变换影响旋转攻击的概率公式,并由此得出当取旋转数r=1时能使旋转攻击最大限度地通过相应的循环移位变换。 This paper studied three kinds of circle shift transformation effect on the performance of rotational attack, using probability knowledge proved that the equal-word circle shift transformation had no influence on the attack mode and efficiency of rotational attack. It presented influence probability formulas on rotational attack of the longer-word circle shift transformation and the shorter-word circle shift transformation. These formulas show that if the rotational amount r is set to 1 the corresponding circle shift transformation preserves the rotational property at most.
出处 《计算机应用研究》 CSCD 北大核心 2014年第10期3141-3144,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2011AA7011016)
关键词 旋转攻击 循环移位变换 杂凑算法 密码分析 rotational attack circle shift transformation hash algorithm cryptanalysis
  • 相关文献

参考文献16

  • 1KHOVRATOVICH D, NIKOLIC I.Rotational cryptanalysis of ARX[C]//Proc of the 17th International Workshop on Fast Software Encryption.2010:333-346.
  • 2FERGUSON N, LUCKS S, SCHNEIER B, et al.The skein hash function family[EB/OL].(2009-04-30).https://www.schneier.com/skein.html.
  • 3KHOVRATOVICH D, NIKOLIC I, RCHBERGER C.Rotational rebound attacks on reduced skein[R/OB].(2010-10-20).http://eprint.iacr.org/2010/538.
  • 4BERNSTEIN D.Cubehash, submission to NIST, round 2[EB/OL].(2009-04-20).http://csrc.nist.gov/groups/ST/hash/sha-3/index.html.
  • 5ALIZADEH J, MIRGHADRI A.A new distinguisher for CubeHash-8/b and CubeHash-15/b compression functions[EB/OL].(2011-10-05).http://eprint.iacr.org/2011/550.
  • 6GLIGOROSKI D, KLIMA V, KNAPSKOG S, et al.Cryptographic hash function Blue Midnight Wish[C]//Proc of the 1st International Workshop on Security and Communication Networks.2009:1-8.
  • 7LEURENT G, BOUILLAGUET C, FOUQUE P.SIMD is a message digest[EB/OL].(2009-04-30).http://www.di.ens.fr/-leurent/simd.html.
  • 8NIKOLIC I, PIEPRZYK J, SOKOLOWSKI P, et al.Rotational cryptanalysis of(modified) versions of BMW and SIMD[EB/OL].(2010-03-20).http://en.wikipedia.org/wiki/NIST_hash_function_competition.
  • 9ASSCHE V.A rotational distinguisher on Shabals keyed permutation and its impact on the security proofs[EB/OL].(2012-08-18).http://gva.noekeon.org/papers/ShabalRotation.pdf.
  • 10AUMASSON J.On the pseudorandomness of Shabal’s keyed permutation[EB/OL].(2009-08-05).http://eprint.iacr.org/2009/266.pdf.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部