期刊文献+

分组密码SHACAL2的Biclique攻击

Biclique Cryptanalysis of Block Cipher SHACAL2
下载PDF
导出
摘要 分组密码算法SHACAL2是由Handschuh等人于2002年基于标准散列函数SHA2设计的,具有较高的安全性.利用SHACAL2算法密钥生成策略与扩散层的特点,构造了SHACAL2的首18轮32维Biclique.基于构造的Biclique对完整64轮SHACAL2算法应用Biclique攻击.分析结果表明,Biclique攻击恢复64轮SHACAL2密钥的数据复杂度不超过2224已知明文,时间复杂度约为2511.18次全轮加密.与已知分析结果相比,Biclique攻击所需的数据复杂度明显降低,且计算复杂度优于穷举攻击.对全轮的SHACAL2算法,Biclique攻击是一种相对有效的攻击方法.这是首次对SHACAL2算法的单密钥全轮攻击. SHACAL2 is a block cipher designed by Handschuh H. et al based on the standard Hash function SHA2 in 2002. It one of the European standard block ciphers, and has relatively high security because of its long block length and key length, which are 256b and 512b respectively. There have been a few security analysis results about SHACAL2, such as impossible differential cryptanalysis and related-key rectangle attack on reduced rounds of SHACAL2. Taking advantage of the characteristics of the key schedule and the permutation layer of block cipher SHACAL2, 18-round 32-dimensional Biclique of the first eight rounds of SHACAL2 is constructed. Based on the Biclique constructed, Biclique attack is applied to the whole 64-round SHACAL2. And the results show that, using Biclique attack to recover the whole 512b key information of 64-round SHACAL2, the data complexity is no more than 2224 chosen plaintexts, and the time complexity is 2511'18 64-round encryptions. Compared with the known analysis results, the data complexity of Biclique attack decreased obviously, and the time complexity is better than exhaustive search. For whole round SHACAL2,Biclique attack is a relatively effective method. This is the first single-key attack for whole round SHACAL2.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第10期2329-2335,共7页 Journal of Computer Research and Development
基金 内蒙古自治区科技创新引导奖励基金资助项目(2012) 国家自然科学基金面上项目(61272476)
关键词 分组密码 SHACAL2 Biclique攻击 中间相遇攻击 复杂度 block cipher SHACAL2 Biclique attack meet-in-the-middle (MITM) attack complexity
  • 相关文献

参考文献17

  • 1Matsui M. New block encryption algorithm MISTY [GJ // LNCS 1267: Proc of the 4th Int Workshop on Fast Software Encryption 1997. Berlin: Springer, 1997: 54-68.
  • 2Aoki K, Ichikawa T, Kanda M, et al. Camellia: A 128-bit block cipher suitable for multiple platforms-design and analysis [GJ //LNCS 2012: Proc of the 3rd Int Symp on Theoretical Aspects of Computer Software. Berlin: Springer, 2001: 39-56.
  • 3Handschuh H, Naccache D. SHACAL: A family of block ciphers [EB/OL]. 2001[2013-11-25]. http://www. crypto.
  • 4nessie. orgBurrows J H. Secure hash standard [R/OLJ. Washington D C: Department of Commerce, 1995[2013-11- 25J. http://oai.dtic.mil/oa//oai?verb= getRecord&'metadata Prefix= html&'identifier= ADA406543.
  • 5Shin y, Kim J, Kim G, et al. Differential-linear type attacks on reduced rounds of SHACAL-2 [GJ //LNCS 3108: Proc of Information Security and Privacy 2004. Berlin: Springer, 2004: 110-122.
  • 6Hong S, Kim J, Kim G, et al. Impossible differential attack on 30-round SHACAL-2 [GJ //LNCS 2904: Proc of Progress in Cryptology (INDOCRYPT 2003). Berlin: Springer, 2003: 97-106.
  • 7Kim J, Kim G, Lee S, et al. Related-key attacks on reduced rounds of SHACAL-2 [GJ //LNCS 3348: Proc of Progress in Cryptology (INDOCRYPT 2005). Berlin: Springer, 2005: 175-190.
  • 8Lu J, Kim J, Keller N, et al. Related-key rectangle attack on 42-round SHACAL-2 [GJ //LNCS 4176: Proc of Information Security 2006. Berlin: Springer, 2006: 85-100.
  • 9Jqiang L, Jongsung K. Attacking 44 rounds of the SHACAL-2 block cipher using related-key rectangle cryptanalysis [J]. IEICE Trans on Fundamentals of Electronics, Communications and Computer Sciences, 2008, 91(9): 2588-2596.
  • 10Khovratovich D, Rechberger C, Savelieva A. Biclique for preirnages , Attacks on Skein-512 and the SHA-2 family [GJ //LNCS 7549: Proc of Fast Software Encryption 2012. Berlin: Springer, 2012: 244-263.

二级参考文献13

  • 1NESSIE -- new European schemes for signatures, integrity and encryption, performance of optimized implementations of the NESSIE primitives, version 2.0[EB/OL]. http://www.cosic.esat.kuleuven.be/ nessieddeliverables/D21 -v2.pdf, 2008.
  • 2AOKI K, ICHIKAWA T, KANDA M, et al. Camellia: a 128-bit block cipher suitable for multiple platforms design and analysis[A]. Theoretical Aspects of Computer Software, Third International Symposium, TACS '97[C]. Sendai, Japan, 1997.39-56.
  • 3MATSUI M. New block encryption algorithm MISTY[A]. Fast Software Encryption, 4th International Workshop, FSE '97[C]. Haifa, Israel, 1997.54-68.
  • 4http://www.cosic.esat.kuleuven.belnessie[EB/OL]. 2008.
  • 5Secure Hash Standard FIPS 180-2 [S]. NIST, 2002.
  • 6DAEMEN J, RIJNMEN V. The Design of Rijndael AES: The Advanced Encryption Standard [M]. Berlin Heidelberg: Springer- Verlag, 2002, 30-45.
  • 7HONG S, KIM J, KIM G, et al. Impossible differential attack 30-round SHACAL-2[A]. Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India[C]. New Delhi, India, 2003.97-106.
  • 8SHIN Y, KIM J, KIM G, et al. Differential-linear type attacks on re duced rounds of SHACAL-2[A]. Information Security and Privacy 9th Australasian Conference, ACISP 2004[C]. Sydney, Australia, 2004. 110-122.
  • 9KIM J, KIM G. LEE S, et al. Related-key attacks on reduced rounds of SHACAL-2[A]. 5th International Conference on Cryptology in India[C]. Chennai (Madras), India, 2004. 175-190.
  • 10LU J, LEE C, KIM G, KELLER N, et al. Related-key attack on 42-round SHACAL-2[A]. 9th Information Security Conference[C]. 2006.85-100.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部