期刊文献+

Khudra算法的相关密钥差分分析

Related-key Differential Analysis of Khudra Algorithm
下载PDF
导出
摘要 Khudra算法是一种总轮数为18的轻量级分组密码算法。现有分析方法使用相关密钥差分分析Khudra算法,通过在2个密钥上引入差分,构造14轮区分器攻击16轮Khudra算法,区分器的攻击概率为2^(-56.85)。基于此,同样使用相关密钥差分分析Khudra算法,仅在1个密钥上引入差分构造10轮区分器,共攻击16轮Khudra算法。分析结果表明,该10轮区分器与现有相关密钥差分分析的14轮区分器相比攻击概率提高了2^(28.425),整个分析过程的数据复杂度为2^(33),时间复杂度为2^(95)。 Khudra algorithm is a kind of lightweight block cipher algorithm which has 18 rounds. The existing analysis method,which uses the impossibility relevant key difference to analysis Khudra algorithm,constructs a 14 rounds distinguisher to attack the 16 round Khudra algorithm by introducing a difference on two keys. The successful attack probability of the distinguisher is 2^-56.85. In this paper,it constructs 10 rounds distinguisher,by making difference on one key,to attack Khudrain total 16 rounds based on the relevant key difference. Analysis results show that the successful probability of the 10 rounds distinguisher improvs 2^28.425 compared with the previous 14 rounds distinguisher,data complexity of the whole analysis process is 2^33, and time complexity is 2^95.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第11期117-121,共5页 Computer Engineering
基金 国家自然科学基金(61272434 61672330 61602287) 山东省自然科学基金(ZR2013FQ021)
关键词 Khudra算法 相关密钥攻击 差分攻击 区分器 攻击概率 Khudra algorithm related-key attack differential attack distinguisher attack probability
  • 相关文献

参考文献3

二级参考文献22

  • 1National Bureau of Standards. Data Encryption Standard[EB/OL]. (1999-10-25). http://csrc.nist.gov/publications/fips/fips46-3/fips46- 3.pdf.
  • 2Biham E, Shamir A. Differential Cryptanalysis of DES Like Crypto Systems[J]. Journal of Cryptography, 1999, 4(4): 70-72.
  • 3Mitsuru M. Linear Cryptanalysis Method for DES Cipher[C] //Proc. of EUROCRYPT’93. Berlin, Germany: Springer-Verlag, 1994.
  • 4Dunkelman O B, Nathan K, Shamir A. A Practical-time Attack on the A5/3 Cryptosystem Used in the 3rd Generation GSM Telephony[EB/OL]. (2010-01-10). http://eprint.iacr.org/2010/013.
  • 5Biham E. New Types of Cryptanalytic Attacks Using Related Keys[J]. Journal of Cryptology, 1994, 7(4): 229-246.
  • 6David W. The Boomerang Attack[J]. Lecture Notes in Computer Science, 1999, 36(16): 156-170.
  • 7ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST- 2002-507932[EB/OL]. (2004-02-11). http://www.ecrypt.eu. org/stream.
  • 8European Union. European Project IST-1999-12324: New European Schemes for Signatures, Integrity, and Encryp- tion[EB/OL]. (2002-03-16). http://www.cosic.esat.kuleuven. be/nessie.
  • 9Biryukov A. The Design of a Stream Cipher LEX[C]// Proceedings of the 13th International Conference on Selected Areas in Cryptography. Berlin, Germany: ACM Press, 2007: 67-75.
  • 10Velichkov V, Rijmen V, Preneel B. Algebraic Cryptanalysis of a Small-scale Version of Stream Cipher LEX[J]. Information Security, 2010, 4(2): 49-61.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部