期刊文献+

MORUS-1280-128算法的区分分析

Distinguishing Attack of MORUS-1280-128
下载PDF
导出
摘要 MORUS算法是被提交到CAESAR竞赛中的一种认证加密算法,已经进入第三轮安全评估。对算法进行区分分析对于其安全性评估具有很重要的意义。以MORUS-1280-128为例,在nonce重用的情况下,对算法进行区分分析能够区分出密文的绝大部分比特,并通过寻找内部状态碰撞对算法进行标签伪造攻击。该研究结果对MORUS算法的安全性分析有很重要的意义。 MORUS is an authenticated cipher,which is submitted to CAESAR competition and has been selected into the third-round security evaluation stage.To study the distinguishing attack of MORUS is significant for its security evaluation.This paper studied the distinguishing attack of MORUS-1280-128 in a nonce-resuse scenario.By using this method,the majority ciphertext can be distinguished,and a collision in internal state can be found for a tag forgery attack.The paper’s research results are of great significance for the safety analysis of MORUS.
作者 郑秀林 宋海燕 付伊鹏 ZHENG Xiu-lin;SONG Hai-yan;FU Yi-peng(Department of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China;School of Telecommunications Engineering,Xidian University,Xi’an 710071,China)
出处 《计算机科学》 CSCD 北大核心 2018年第4期152-156,共5页 Computer Science
关键词 认证加密 MORUS算法 区分分析 伪造攻击 Authenticated encryption MORUS algorithm Distinguishing attack Forgery attack
  • 相关文献

参考文献2

二级参考文献18

  • 1张龙,吴文玲,温巧燕.mod 2^n加运算与F2上异或运算差值的概率分布和递推公式[J].北京邮电大学学报,2007,30(1):85-89. 被引量:12
  • 2Hawkes P and McDonald C, et al.. Design and primitive specification for Shannon stream cipher[EB], http://eprint. iacr. org/2007/044, 2007.
  • 3Hakala R M and Nyberg K. Linear Distinguishing attack on Shanaon[C]. ACISP 2008, 2008, LNCS 5107:297 305.
  • 4Hakala R M and Nyberg K. A multidimensional linear distinguish attack on Shanaon[J]. International Journal of Applied Cryptography, 2009, 1(3): 161-169.
  • 5Hassanazadeh M M and Parker M G, et al.. Differential distinguishing attack on Shannon based fault analysis[C]. International Symposium on Telecommunications 2008: 671-676.
  • 6Zahra A, Javad M and Risto M, et al.. A practical distinguisher for the Shannon cipher[J]. Journal of Systems and Software, 2010, 83(4): 543-547.
  • 7Crowley P. Improved cryptanalysis of Py[R]. ECRYT Stream Cipher Project, Report 2006/010, 2006.
  • 8Baigneres T, Junod P, and Vandenay S. How far can we go beyond linear cryptanalysis[C]. In Advances in Cryptology -Asiacrypt 2004, LNCS 3329: 432-450.
  • 9Cho Joo-yeon and Pieprzyk J. An improved distinguisher for dragon[R]. ESTREAM, ECRYPT Stream Cipher Project, Report 2007/002, 2007.
  • 10Eli Biham,Adi Shamir.Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology . 1991 (1)

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部