期刊文献+

改进的Keccak算法4轮区分器

Improved 4-Round Distinguisher for the Keccak Algorithm
下载PDF
导出
摘要 Keccak算法是新一代Hash函数标准SHA-3的获胜算法。如何构造一个好的区分器是当前Hash函数中的研究热点。该文在分析Keccak算法及算法中各个置换性质的基础上,通过线性分析方法和差分分析方法,研究了整体Keccak算法的差分传播特性。利用Keccak旋转变换和z周期性质,成功构造出4轮Keccak置换的区分器。通过分析Keccak算法的旋转对的传播特性,对Morawiecki区分器的构造方法进行了修正改进。实验结果表明该区分随机置换和Keccak变换的区分概率更大,区分效果比Morawiecki构造的区分器区分效果更好。 The Keccak algorithm is selected as the new Hash function standard of SHA-3 fianally. How to construct a good distinguisher is a hot topic in cryptanalysis of the Hash function at present. In this paper, on the base of the permutation property, we research the differential propagation characteristics of the Keccak algorithm by the linear and differential cryptanalysis methods. By using the Keccak rotation transform characteristics and z cycle properties, we construct the distinguisher of the 4-round Keccak permutation successfully. Then we improve the 4-round Morawiecki' distinguisher of the Keccak algorithm by using the propagation characteristics of the rotational pair. The research results show that our improved rotational distinguisher can distinguish the random permutation from the Keccak permutation with a higher probability, and the distinguish effect is better than Morawiecki's distinguisher.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2016年第3期453-457,共5页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60903199) 高等学校创新引智基地基金(B08038) 国家留学基金委项目(201506965088)
关键词 差分分析 HASH函数 Keccak算法 随机置换 differential cryptanalysis Hash function Keccak algorithm random permutation
  • 相关文献

参考文献14

  • 1National Institute of Standards and Technology. SHA-3 competition(2007-2012)[S/OL]. [2014-01-01]. http://csrc. nist.gov/groups/ST/hash/sha-3/index.html.
  • 2CHANG Shu-jen, RAY P, WILLIAM E B, et al. Third round report of the SHA-3 cryptographic Hash algorithm competition[M]. Washington, America: U.S. Department of Commerce, 2012.
  • 3DINUR I, DUNKELMAN O, SHAMIR A. New attacks on keccak-224 and keccak-256[C]//19th International Workshop, Fast Software Encryption 2012. Washington: Springer-Verlag, 2012, 7549: 442-461.
  • 4PAWEL M, JOSEF P, MARIAN S. Rotational cryptanalysis of round-reduced Keccak[C]//20th International Workshop, Fast Software Encryption 2013. Singapore: Springer-Verlag, 2014, 8424: 241-262.
  • 5JEAN J, NAYA P M, PEYRIN T. Improved rebound attack on the finalist grostl[C]//19th International Workshop, Fast Software Encryption 2012. Washington: Springer-Verlag: 2012, 7549: 110-126.
  • 6李倩男,李云强,蒋淑静,路遥.Keccak类非线性变换的差分性质研究[J].通信学报,2012,33(9):140-146. 被引量:7
  • 7PAWEL S, GERGOR L, CHRISTOF P. Keccak und der SHA-2[J]. Datenschutz Und Datensicherheit, 2013, 37(11): 712-719.
  • 8MARIA N P, ANDREA R, WILLI M. Practical analysis of reduced-round Keccak[C]//12th International Conference on Cryptology. Chennai, India: Springer-Verlag, 2011, 7107: 236-254.
  • 9MOSTAFA T, PATRICK S. Differential power analysis of MAC-Keccak at any key-length[C]//8th International Workshop on Security, IWSEC 2013. Okinawa, Japan: Springer-Verlag, 2013, 8231 : 68-82.
  • 10ELENA A, BART M, BART E Open problems in Hash function security[J]. Designs, Codes and Cryptography, 2015, 77(2): 611-631.

二级参考文献11

  • 1NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family[J]. Federal Register Notices 72, 2007, 212: 62212-62220.
  • 2ANDREW R, RAY P, CHANG S J. Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition[R]. Infor marion Technology Laboratory National Institute of Standards and Technology, Gaithersburg, 2009.
  • 3MELTEM S T, RAY P, LAWRENCE E B, et al. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competi tion. Computer Security Division[R]. Information Technology Labo-ratory National Institute of Standards-and Technology, Gaithersburg, 2011.
  • 4NIST. The SHA-3 Finalists candidates U S department of commerce national information service[EB/OL], http://csrc, nist.gov. /groups/ ST/hash/sha-3/Round3/submissions-round3. html.
  • 5GUIDO B, JOAN D, MICHAEL P, et al. Keccak sponge function family maiia document[EB/OL], http://csrc, nist.gov /groups/ ST /hash /sha-3/Roundl/submissions roundl. Html.
  • 6罗岚,叶娅兰,许春香等.在信念网模型下的SHA3前五名算法注记[EB/OL].htcp://www.scienceet.cn/upload/blog/-ile/2010/12/2010121592436256375.pdf.
  • 7GUIDO B, JOAN D, MICHAEL P, et al. A belt-and-mill hash func- tion[EB/OL], http://radiogatun.noekeon.org.
  • 8JOAN D, CLAPP C S K. Fast hashing and stream encryption with PANAMA[A]. Fast Software Encryption 1998 (S Vaudenay, ed)[C]. 1998.60-74.
  • 9JOAN D. Cipher and Hash Function Design Strategies Based on Lin- ear and Differential Cryptanalysis[D]. Belgium: Katholieke Univer- sities Leuven, 1995.
  • 10EPHRAIM A. Sharing Nonlinear Gates in the Presence of Glitches[D]. Enschede, Holland: University of Twente, 2010.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部