期刊文献+

ARX函数的两轮迭代线性化条件研究

Research on Two-iteration Linearization Conditions of ARX Function
下载PDF
导出
摘要 含模加运算、循环移位运算和异或加运算的密码算法称为ARX型算法,3种运算的混合使用可以达到更好的扩散和混乱效果。为此,给出二元ARX函数的定义,研究其两轮迭代同时线性化的条件,利用统计分析方法得到线性化条件成立的元素个数的计算公式。分析两轮独立条件下得到的线性化条件成立的概率,发现利用统计分析的方法能够更准确地刻画线性化条件成立概率的影响因素,并且增加一个左右块变换不会对两轮ARX函数的线性化条件产生影响。 The cryptographic algorithm including modular addition operation (Addition), rotation shift operation (Rotation) and XOR operation (XOR) is called ARX type algorithm. The mixed use of the 3 operations can achieve better diffusion and confusion effects. This paper defines the ARX function of two variables, researches on the simultaneous linearization condition of two iterations of the function. Using the method of statistic analysis, the computational formula of the element number for guaranteeing the linearization conditions is given. Analyzing the probability of the linearized condition establishment under the condition that the two iterations are independent,it is found that the method of statistic analysis more accurately describes the factors that affect the probability of the linearized condition. Moreover, the addition of a left and right block transform does not affect the linearization condition of the ARX function
作者 陈士伟
出处 《计算机工程》 CAS CSCD 北大核心 2017年第6期101-104,共4页 Computer Engineering
基金 国家自然科学基金(61272488)
关键词 模2^n加 模2加 循环左移 ARX函数 线性化条件 modular 2^n addition modular 2 addition rotation left shift ARX function linearization condition
  • 相关文献

参考文献5

二级参考文献40

  • 1张龙,吴文玲,温巧燕.mod 2^n加运算与F2上异或运算差值的概率分布和递推公式[J].北京邮电大学学报,2007,30(1):85-89. 被引量:12
  • 2Ekdahl P, Johansson T. A new version of the stream cipher SNOW[C]// SAC 2002. [ S. l. ] : Springer-Verlag, 2002 : 47-61.
  • 3Biham E, Seberry J, Gonzalez N. Py(Roo) : a fast and secure stream cipher using rolling arrays [ EB/OL ]. (2005) [2009-06-15]. http://www. ecrypt. eu. org/ stream/ 2005/023.
  • 4Lai Xuejia, Massey J L. A proposal for a new block encryption standard [ C ] // EUROCRYPT'90. [S. l.] : Springer-Verlag, 1990 : 389-404.
  • 5Sekar G, Paul S, Preneel B. Distinguishing attacks on the stream cipher Py[EB/OL]. (2005) [ 2009-06-15 ]. http ://www. ecrypt, eu. org/stream/2005/081.
  • 6Crowley P. Improved eryptanalysis of Py [ EB/OL ]. (2006) [ 2009-06-15 ]. http://www. ecrypt. eu. org/ stream/2006/010.
  • 7Baigneres T, Junod P, Vandenay S. How far can we go beyond linear cryptanalysis [ C ] //Asiacrypt 2004. Jeju Island : Springer-Verlag, 2004 : 432-450.
  • 8Willi Meier. On the security of the IDEA block cipher[ A ]. Advances in Cryptology-EUROCRYPT'93 [C]. Berlin, Hedelberg ,New York :Springer-Verlag, 1993, 371-386.
  • 9Lai X,Massey J L. A Proposal for a new block encryption standard[A]. Advances in Cryptology-EUROCRYPT'90[C]. Berlin .Hedelberg .New York :Springer-Verlag 1991,389-440.
  • 10Lai X. On the design and security of block ciphers[A]. In: Massey J L ed., ETH Series in Information Proceeding[C]. Vol. 1. 1992,225-248.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部