期刊文献+

低轮PUFFIN算法的积分攻击 被引量:3

Integral cryptanalysis on reduced-round PUFFIN
下载PDF
导出
摘要 PUFFIN是一个分组长度为64bit的轻量级分组密码算法,其密钥长度为128bit。对PUFFIN抵抗积分攻击的能力进行研究,构造并证明PUFFIN算法存在5轮和6轮积分区分器。利用6轮积分区分器对8轮PUFFIN进行积分攻击,可恢复2轮共100bit轮密钥,攻击的数据复杂度为220个选择明文,时间复杂度约为233次8轮加密,存储复杂度为220,这是目前为止对PUFFIN最好的积分分析结果。 PUFFIN is a lightweight block cipher, in which the block length is 64 bit while the key size is 128 bit. The integral cryptanalysis resistance ability of PUFFIN was analyzed. The existence of 5 and 6 round integral distinguisher in PUFFIN was constructed and proved. An integral attack on 8 round PUFFIN was mounted by 6 round integral distinguisher to recover 2 round 100 bit round cipher. The data complexity of the attack is 220 chosen plaintexts, the time complexity is about 233 8 round eneryptions, and the space complexity is 220. This has been the best integral attack on PUFFIN up to now.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2015年第6期129-134,共6页 Journal of National University of Defense Technology
基金 国家自然科学基金资助项目(61402515) 信息保障技术国家重点实验室开放基金资助项目(KJ-14-003)
关键词 PUFFIN 轻量级分组密码 积分攻击 PUFFIN lightweight block cipher integral attack
  • 相关文献

参考文献16

  • 1Hong D, Sung J, Hong S,et ak HIGHT: a new block cipher suitable for low-resource device [ C ]//Proceedings of Cryptographic Hardware and Embedded Systems,2006,4249: 46 - 59.
  • 2Wu W L, Zhang L. LBlock: a lightweight block cipher[ C ] // Proceedings of Applied Cryptography and Network Security, 2011,6715 : 327 -344.
  • 3Guo J, Peyrin T, Poschtmnn A, et al. The LED block cipher[ C]// Proceedings of Cryptographic Hardware and Embedded Systems, 2011,6917 : 326 - 341.
  • 4Bogdanov A, Knudsen L, Leander G, et al. PRESENT: an ultra-lightweight block cipher [ C ]//Proceedings of Cryptographic Hardware and Embedded Systems,2007,4727: 450 - 466.
  • 5Cheng H, Heys H, Wang C. PUFFIN : a novel compact block cipher targeted to embedded digital systems [ C // Proceedings of 11th EUROMICRO Conference on Digital System Design : Architectures, Methods and Tools, 2008 : 383 - 390.
  • 6Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems[ C] //Proceedings of Advances in Cryptology: CRYPTO'90, 1990,537 : 2 -21.
  • 7Matsui M. Linear cryptanalysis method for DES cipher[ C ]// Proceedings of Advances in Cryptology: EUROCRYPT '93, 1993,765 : 386 -397.
  • 8Biham E. New type of cryptanalytic attacks using related keys[ J ]. Journal of Cryptology, 1994,7(4) : 229 -246.
  • 9Moore J H, Simmons G J. Cycle structure of the DES for keys having palindromic ( or antipalindromic) sequences of round keys[ J]. IEEE Transactions on Software Engineering, 1987, 13(2) :262 -273.
  • 10Leander G. On linear hulls, statistical saturation attacks, PRESENT and a eryptanalysis of PUFFIN [ C l //Proceedings of Advances in Cryptology-EUROCRYPT, 2011,6632 : 303 - 322.

二级参考文献20

  • 1DAEMEN J, KNUDSEN L R, RLIMEN V. The block cipher SQUARE[A]. FSE 1997[C]. LNCS 1267, 1997, 149-165.
  • 2SCHNEIER B, KELSEY J, WHIT/NG D, et al. The Twofish Encryption Algorithm: A 128-bit Block Cipher[M]. John Wiley & Sons, ISBN 0-471-35381-7, USA, 1999.
  • 3LUCKS S. The saturation attack-a bait for twofish[A]. FSE 2001[C]. Japan, LNCS 2355, 2002.1-15.
  • 4SHIRAI T, SHIBUTANI K, AKISHITA T, et aL The 128-bit blockcipher CLEFIA[A]. FSE 2007[C].Luxembourg, LNCS 4593, 2007. 181-195.
  • 5SONY Corporation. The 128-blt blockcipher CLEFIA: algorithm specification [EB/OL]. http://www.sony.net/Products/clefia/technical/ data/clefia-spec- 1.0.pdf. 2007.
  • 6SONY Corporation. The 128-bit blockcipher CLEFIA: security and performance evaluations [EB/OL]. http://www.sony.net/Products/clefia/technical/data/clefia-eval- 1.0.pdf. 2007.
  • 7TSUNOO Y, TSUJIHARA E, SHIGERI M, et al. Impossible differential cryptanalysis of CLEFIA[A]. FSE 2008[C]. Switzerland, LNCS 5086, 2008. 398-411.
  • 8WANG W, WANG X Y. Improved impossible differential cryptanalysis of CLEFIA[EB/OL]. http://eprint.iacr.org/2007/466.2007.
  • 9FERGUSON N, KELSEY J, LUCKS S, et al. Improved cryptanalysis of Rijndael[A]. FSE 2000[C]. USA, LNCS 1978, 2001. 213-230.
  • 10Wheeler D,Needham R.TEA,a Tiny Encryption Algorithm[C] //FSE 1995,LNCS 1008:363-366.

共引文献18

同被引文献4

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部