期刊文献+

对SMS4密码算法改进的差分攻击 被引量:3

Improved Differential Attack on 23-Round SMS4
下载PDF
导出
摘要 差分分析和线性分析是重要的密码算法分析工具.多年来,很多研究者致力于改善这两种攻击方法.Achiya Bar-On等人提出了一种方法,能够使攻击者对部分状态参与非线性变换的SPN结构的密码算法进行更多轮数的差分分析和线性分析.这种方法使用了两个辅助矩阵,其目的就是更多地利用密码算法中线性层的约束,从而能攻击更多轮数.将这种方法应用到中国密码算法SMS4的多差分攻击中,获得了一个比现有攻击存储复杂度更低和数据复杂度更少的攻击结果.在成功概率为0.9时,实施23轮的SMS4密钥恢复攻击需要2^(113.5)个明文,时间复杂度为2^(126.7)轮等价的23轮加密.这是目前为止存储复杂度最低的攻击,存储复杂度为2^(17)个字节. For years,many cryptanalysts have been devoted to working on analyzing the security of block ciphers against differential attacks and linear attacks. Thus,there are copious methods to cryptanalyze a block cipher with differential and linear cryptanalyses. An original method proposed by Achiya Bar-On et al. enables attackers to analyze more rounds of a partial SPN network in differential and linear cryptanalyses. The method involves two auxiliary matrices,which makes it possible that more constraints on differences can be exploited to sieve the inappropriate pairs. In the paper,the method is implemented to SMS4 in the setting of a multiple differential cryptanalysis. By utilizing the 2^(14) existing 19-round differential characteristics,the paper carries out a 23-round key-recovery attack on SMS4,which leads to a lower data and memory complexities than previous multiple differential attack results on 23-round SMS4,namely,2^(113.5) chosen plaintexts and 2^(17) bytes at a success possibility of 0.9. The attack presented in the paper can recover 128-bit key within 2^(126.7) equivalent 23-round encryptions
作者 赵艳敏 刘瑜 王美琴 ZHAO Yan-Min;LIU Yu;WANG Mei-Qin(School of Mathematics,Shandong University,Ji'nan 250100,China;Science and Technology on Communication Security Laboratory,Chengdu 610041,China;School of Computer Engineering,Weifang University,Weifang 261041,China)
出处 《软件学报》 EI CSCD 北大核心 2018年第9期2821-2828,共8页 Journal of Software
基金 国家重点基础研究发展计划(973)(2013CB834205) 国家自然科学基金(61133013,61572293,61602276) 教育部新世纪优秀人才项目(NCET-13-0350) 山东省自然科学基金(ZR2016FM22) 保密通信重点实验室基金项目(9140c110207150c11050)~~
关键词 SMS4 分组密码 多差分攻击 矩阵 存储复杂度 SMS4 block cipher multiple differential attack matrices memory complexity
  • 相关文献

同被引文献17

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部