期刊文献+

分组密码TWINE的中间相遇攻击 被引量:4

Meet-in-the-Middle Attack on TWINE Block Cipher
下载PDF
导出
摘要 将Biclique初始结构与标准的三子集中间相遇攻击相结合,给出了一种普遍的中间相遇攻击模式.与Biclique分析相比,该模式下的攻击作为算法抗中间相遇攻击的结果更为合理.进一步地,评估了算法TWINE抗中间相遇攻击的能力,通过合理选择中立比特位置以及部分匹配位置,给出了18轮TWINE-80以及22轮TWINE-128算法的中间相遇攻击结果.到目前为止,这是TWINE算法分析中数据复杂度最小的攻击结果. This paper presents a general structure of meet-in-the-middle attack by combing the advantages of Biclique and three sub-set meet-in- the-middle, Compared with the Biclique cryptanalysis proposed in Asiacrypt 2011, this attack model is more reasonable to be regarded as the security of one block cipher against meet-in-the-middle attack. Moreover, the study evaluates the security of TWINE against meet-in-the- middle attack and gives attacks on 18-round TWINE-80 and 22-round TWINE-128. Meanwhile, the data complexities of these attacks are the least among the precious attacks on TWINE.
出处 《软件学报》 EI CSCD 北大核心 2015年第10期2684-2695,共12页 Journal of Software
基金 国家重点基础研究发展计划(973)(2013CB338002) 国家自然科学基金(61272476 61232009 61202420)
关键词 分组密码 TWINE 中间相遇攻击 BICLIQUE 数据复杂度 block cipher TWINE meet-in-the-middle Biclique data complexity
  • 相关文献

参考文献2

二级参考文献24

  • 1李清玲,李超.变种Camellia对Square攻击的安全性[J].应用科学学报,2006,24(5):485-490. 被引量:2
  • 2Daemen J, Knudsen L, Rijmen V. The Block Cipher Square [ C]//Fast Software Encryption 1997 ,Lecture Notes in Computer Science,1267. [s. l ] : [s. n. ] ,1997:149-165.
  • 3Koo B, Yeom Y, Song J. Related-Key Boomerang Attack on Block Cipher Square [ EB/OL]. 2010. http://eprint, iacr. org/.
  • 4Demirei H, Selcuk A A. A Meet-in-the-Middle Attack on 8- Round AES [ C ] // Fast Software Eneryption 2008, Lecture Notes in Computer Science5086. [ s. l. ] : [ s. n. ] ,2008 : 116- 126.
  • 5Koblitz N. A course in number theory and cryptography[ M]. New York : Springer-Verlag, 1987.
  • 6Dunkelman O, Keller N, Sharnir A. Improved Single-Key Attack on 8-round AES [ EB/OL ]. 2010. http ://eprint. iacr. org/.
  • 7Demirci H, Taskm I, Coban M, et al. Improved Meet-in-the-middle Attacks on AES[ C] //Lecture Notes in Computer Science ,5922. [ s. l.]: [ s. n. ] ,2009.
  • 8冯国登,吴文玲.分组密码的分析和设计[M].北京:清华大学出版社,2000.
  • 9Daemen J,Rijmen V. The Design of Rijndael[M].Berlin:Springer-Verlag,2001.
  • 10Bogdanov A,Khovratovich D,Rechberger C. Biclique Cryptanalysis of the Full AES[EB/OL].http://eprint.iacr.org/,2011.

共引文献3

同被引文献19

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部