期刊文献+

E2算法的中间相遇攻击 被引量:1

Meet-in-the-middle attacks on E2
下载PDF
导出
摘要 作为AES的候选算法,E2算法由于其特殊的两层SP结构一直是人们研究的热点。研究了E2算法抵抗中间相遇攻击的能力。基于E2算法的结构,利用中间相遇的思想设计了一个4轮区分器,利用该区分器,对E2算法进行了5轮、6轮中间相遇攻击。研究结果表明,E2-128算法对于5轮中间相遇攻击以及E2-256算法对于6轮中间相遇攻击是不抵抗的。这是首次用中间相遇的攻击方法对E2算法进行的分析,相对于已有的结果,该方法降低了所用数据复杂度。 As a candidate of AES,E2 algorithm has attracted wide attention because of its unique two SP structures.We evaluate the security of E2 block cipher against meet-in-the-middle attacks.Based on the idea of meet-in-the-middle,by analyzing the feathers of E2 algorithm,a 4-round distinguisher is designed.Using the distinguisher,some meet-in-the-middle attacks are made on 5/6-round E2-128/256.It is shown that the E2-128 algorithm to 5-round and the E2-256 algorithm to 6-round are not immune to meet-in-the-middle attacks.This is the first time to use the meet-in-the-middle attacks to analyze the E2 algorithm.Compared with the existing results,data complexity is reduced.
出处 《计算机工程与科学》 CSCD 北大核心 2015年第3期524-528,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(61272492 61202492)
关键词 分组密码 中间相遇攻击 E2 攻击复杂度 block cipher meet-in-the-middle attack E2 attack complexity
  • 相关文献

参考文献4

二级参考文献42

  • 1Nakahara J Jr.3D:A three-dimensional block cipher.CANS2008,Springer-Verlag,2008,LNCS 5339:252-267.
  • 2Nakahara J Jr.New impossible differential and known-keydistinguishers for the 3D cipher.ISPEC 2011,Springer-Verlag,2011,LNCS 6672:208-221.
  • 3Barreto P and Rijmen V.The anubis block cipher.http://www.sciencecentral.com/site/497719,2000,06.
  • 4Diffie W and Hellman M.Exhaustive cryptanalysis of theNBS data encryption standard.IEEE Computer,1977,10(6):74-84.
  • 5Demirci H and Selcuk A.A meet in the middle attack on8-round AES.FSE 2008,Springer-Verlag,2008,LNCS 5086:116-126.
  • 6Demirci H,Taskin I,Coban M,et al..Improved meet-in-the-middle attacks on AES.INDOCRYPT 2009,Springer-Verlag,2009,LNCS 5922:144-156.
  • 7Dunkelman O,Keller N,and Shamir A.Improved single-keyattacks on 8-round AES.ASIACRYPT 2010,Springer-Verlag,2010,LNCS 6477:158-176.
  • 8Wei Y,Lu J,and Hu Y.Meet-in-the-middle attacks on 8rounds of the AES block cipher under 192 key bits.ISPEC2011,Springer-Verlag,2011,LNCS 6672:222-232.
  • 9Lee C,Cha Y. The Block Cipher: SNAKE with Provable Resistance Against DC and LC Attacks[C]∥Proc of JWISC’97, 1997:3-17.
  • 10Moriai S, Shimoyama T, Kaneko T. Interpolation Attacks of the Block Cipher: SNAKE[C]∥Proc of Fast Software Encryption, 1999:275-289.

共引文献29

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部