期刊文献+

LiCi算法的基于比特积分攻击 被引量:3

Bit-based Integral Attack on LiCi Algorithm
下载PDF
导出
摘要 为分析目前LiCi算法抵抗积分攻击的能力,利用基于比特的可分性质,结合MILP搜索工具对LiCi算法的积分区分器进行搜索。搜索得到最长轮数积分区分器为12轮积分区分器,利用12轮积分区分器对LiCi算法进行13轮积分攻击。该攻击能够恢复17比特密钥信息,攻击的数据复杂度约为263,时间复杂度约为2100次16轮加密,存储复杂度约为241。为了得到更长轮数的攻击结果,利用10轮积分区分器向后攻击6轮,对LiCi算法进行16轮积分攻击,攻击数据复杂度约为263.6,时间复杂度约为2173次16轮加密,存储复杂度约为2119。积分攻击实验结果表明,13轮LiCi算法不能抵抗积分攻击。 To analyze the current ability of LiCi algorithm to resist integral attacks,this paper uses the bit-based division property and the MILP search tool to search for the integral distinguisher of the LiCi algorithm.The obtained longest round of integral distinguisher is 12-round,and is used to perform 13 rounds of integral attacks that can recover 17-bit key information on the LiCi algorithm.The data complexity of the attack is about 263,the time complexity is about 2100 times of 16-round encryption,and the storage complexity is about 241.In order to obtain a longer round of attack results,a 10-round integral distinguisher is used for 6-round backward attacks,and a 16-round integral attack is performed on the LiCi algorithm.The data complexity of the attack is about 263.6,the time complexity is about 2173 times of 16-round encryption,and the storage complexity is about 2119.Experimental results of integral attacks show that the 13-round LiCi algorithm cannot resist integral attacks.
作者 信文倩 孙兵 李超 XIN Wenqian;SUN Bing;LI Chao(College of Liberal Arts and Sciences,National University of Defense Technology,Changsha 410073,China)
出处 《计算机工程》 CAS CSCD 北大核心 2020年第7期136-142,共7页 Computer Engineering
基金 国家自然科学基金“结构密码分析的原理及应用研究”(61772545) 国家自然科学基金“分组密码算法的安全性分析”(61672530)。
关键词 轻量级分组密码算法 LiCi算法 可分性质 混合整数线性规划 积分攻击 lightweight block cipher algorithm LiCi algorithm division property Mixed Integer Linear(MIL)programming integral attack
  • 相关文献

参考文献5

二级参考文献10

共引文献20

同被引文献11

  • 1尚方舟,沈璇,刘国强,李超.基于MILP搜索的PUFFIN算法积分分析[J].密码学报,2019,6(5):627-638. 被引量:5
  • 2李艳俊,赵京鸣.基于比特可分性的PRIDE和RoadRunneR积分区分器搜索[J].计算机应用研究,2020,37(1):203-207. 被引量:2
  • 3张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 4王永娟,张诗怡,王涛,高杨.对MIBS分组密码的差分故障攻击[J].电子科技大学学报,2018,47(4):601-605. 被引量:6
  • 5韦永壮,史佳利,李灵琛.LiCi分组密码算法的不可能差分分析[J].电子与信息学报,2019,41(7):1610-1617. 被引量:8
  • 6陈伟建,赵思宇,邹瑞杰,张晓宁.PRESENT密码的差分故障攻击[J].电子科技大学学报,2019,48(6):865-869. 被引量:5
  • 7王红艳,韦永壮,刘文芬.ANU,ANU-II和LiCi算法的积分区分器搜索[J].小型微型计算机系统,2020,41(7):1470-1475. 被引量:1
  • 8李艳俊,梁萌.基于比特可分性的BORON和Khudra积分区分器搜索[J].计算机应用研究,2020,37(10):3063-3067. 被引量:2
  • 9M.Ablikim,M.N.Achasov,P.Adlarson,S.Ahmed,M.Albrecht,R.Aliberti,A.Amoroso,M.R.An,Q.An,X.H.Bai,Y.Bai,O.Bakina,R.Baldini Ferroli,I.Balossino,Y.Ban,K.Begzsuren,N.Berger,M.Bertani,D.Bettoni,F.Bianchi,J.Bloms,A.Bortone,I.Boyko,R.A.Briere,H.Cai,X.Cai,A.Calcaterra,G.F.Cao,N.Cao,S.A.Cetin,J.F.Chang,W.L.Chang,G.Chelkov,D.Y.Chen,G.Chen,H.S.Chen,M.L.Chen,S.J.Chen,X.R.Chen,Y.B.Chen,Z.J Chen,W.S.Cheng,G.Cibinetto,F.Cossio,X.F.Cui,H.L.Dai,X.C.Dai,A.Dbeyssi,R.E.de Boer,D.Dedovich,Z.Y.Deng,A.Denig,I.Denysenko,M.Destefanis,F.De Mori,Y.Ding,C.Dong,J.Dong,L.Y.Dong,M.Y.Dong,X.Dong,S.X.Du,Y.L.Fan,J.Fang,S.S.Fang,Y.Fang,R.Farinelli,L.Fava,F.Feldbauer,G.Felici,C.Q.Feng,J.H.Feng,M.Fritsch,C.D.Fu,Y.Gao,Y.Gao,Y.Gao,Y.G.Gao,I.Garzia,P.T.Ge,C.Geng,E.M.Gersabeck,A Gilman,K.Goetzen,L.Gong,W.X.Gong,W.Gradl,M.Greco,L.M.Gu,M.H.Gu,S.Gu,Y.T.Gu,C.Y Guan,A.Q.Guo,L.B.Guo,R.P.Guo,Y.P.Guo,A.Guskov,T.T.Han,W.Y.Han,X.Q.Hao,F.A.Harris,H Hüsken,K.L.He,F.H.Heinsius,C.H.Heinz,T.Held,Y.K.Heng,C.Herold,M.Himmelreich,T.Holtmann,Y.R.Hou,Z.L.Hou,H.M.Hu,J.F.Hu,T.Hu,Y.Hu,G.S.Huang,L.Q.Huang,X.T.Huang,Y.P.Huang,Z.Huang,T.Hussain,W.Ikegami Andersson,W.Imoehl,M.Irshad,S.Jaeger,S.Janchiv,Q.Ji,Q.P.Ji,X.B.Ji,X.L.Ji,H.B.Jiang,X.S.Jiang,J.B.Jiao,Z.Jiao,S.Jin,Y.Jin,T.Johansson,N.Kalantar-Nayestanaki,X.S.Kang,R.Kappert,M.Kavatsyuk,B.C.Ke,I.K.Keshk,A.Khoukaz,P.Kiese,R.Kiuchi,R.Kliemt,L.Koch,O.B.Kolcu,B.Kopf,M.Kuemmel,M.Kuessner,A.Kupsc,M.G.Kurth,W.Kühn,J.J.Lane,J.S.Lange,P.Larin,A.Lavania,L.Lavezzi,Z.H.Lei,H.Leithoff,M.Lellmann,T.Lenz,C.Li,C.H.Li,Cheng Li,D.M.Li,F.Li,G.Li,H.Li,H.Li,H.B.Li,H.J.Li,J.L.Li,J.Q.Li,J.S.Li,Ke Li,L.K.Li,Lei Li,P.R.Li,S.Y.Li,W.D.Li,W.G.Li,X.H.Li,X.L.Li,Z.Y.Li,H.Liang,H.Liang,H.Liang,Y.F.Liang,Y.T.Liang,L.Z.Liao,J.Libby,C.X.Lin,B.J.Liu,C.X.Liu,D.Liu,F.H.Liu,Fang Liu,Feng Liu,H.B.Liu,H.M.Liu,Huanhuan Liu,Huihui Liu,J.B.Liu,J.L.Liu,J.Y.Liu,K.Liu,K.Y.Liu,Ke Liu,L.Liu,M.H.Liu,P.L.Liu,Q.Liu,Q.Liu,S.B.Liu,Shuai Liu,T.Liu,W.M.Liu,X.Liu,Y.Liu,Y.B.Liu,Z.A.Liu,Z.Q.Liu,X.C.Lou,F.X.Lu,H.J.Lu,J.D.Lu,J.G.Lu,X.L.Lu,Y.Lu,Y.P.Lu,C.L.Luo,M.X.Luo b,P.W.Luo,T.Luo,X.L.Luo,S.Lusso,X.R.Lyu,F.C.Ma,H.L.Ma,L.L.Ma,M.M.Ma,Q.M.Ma,R.Q.Ma,R.T.Ma,X.X.Ma,X.Y.Ma,F.E.Maas,M.Maggiora,S.Maldaner,S.Malde,Q.A.Malik,A.Mangoni,Y.J.Mao,Z.P.Mao,S.Marcello,Z.X.Meng,J.G.Messchendorp,G.Mezzadri,T.J.Min,R.E.Mitchell,X.H.Mo,Y.J.Mo,N.Yu.Muchnoi,H.Muramatsu,S.Nakhoul,Y.Nefedov,F.Nerling,I.B.Nikolaev,Z.Ning,S.Nisar,S.L.Olsen,Q.Ouyang,S.Pacetti,X.Pan,Y.Pan,A.Pathak,P.Patteri,M.Pelizaeus,H.P.Peng,K.Peters,J.Pettersson,J.L.Ping,R.G.Ping,R.Poling,V.Prasad,H.Qi,H.R.Qi,K.H.Qi,M.Qi,T.Y.Qi,T.Y.Qi,S.Qian,W.-B.Qian,Z.Qian,C.F.Qiao,L.Q.Qin,X.S.Qin,Z.H.Qin,J.F.Qiu,S.Q.Qu,K.H.Rashid,K.Ravindran,C.F.Redmer,A.Rivetti,V.Rodin,M.Rolo,G.Rong,Ch.Rosner,M.Rump,H.S.Sang,A.Sarantsev,Y.Schelhaas,C.Schnier,K.Schoenning,M.Scodeggio,D.C.Shan,W.Shan,X.Y.Shan,J.F.Shangguan,M.Shao,C.P.Shen,P.X.Shen,X.Y.Shen,H.C.Shi,R.S.Shi,X.Shi,X.D Shi,W.M.Song,Y.X.Song,S.Sosio,S.Spataro,K.X.Su,P.P.Su,F.F.Sui,G.X.Sun,H.K.Sun,J.F.Sun,L.Sun,S.S.Sun,T.Sun,W.Y.Sun,X Sun,Y.J.Sun,Y.K.Sun,Y.Z.Sun,Z.T.Sun,Y.H.Tan,Y.X.Tan,C.J.Tang,G.Y.Tang,J.Tang,J.X.Teng,V.Thoren,I.Uman,B.Wang,C.W.Wang,D.Y.Wang,H.J.Wang,H.P.Wang,K.Wang,L.L.Wang,M.Wang,M.Z.Wang,Meng Wang,W.Wang,W.H.Wang,W.P.Wang,X.Wang,X.F.Wang,X.L.Wang,Y.Wang,Y.D.Wang,Y.F.Wang,Y.Q.Wang,Y.Y.Wang,Z.Wang,Z.Y.Wang,Ziyi Wang,Zongyuan Wang,D.H.Wei,P.Weidenkaff,F.Weidner,S.P.Wen,D.J.White,U.Wiedner,G.Wilkinson,M.Wolke,L.Wollenberg,J.F.Wu,L.H.Wu,L.J.Wu,X.Wu,Z.Wu,L.Xia,H.Xiao,S.Y.Xiao,Z.J.Xiao,X.H.Xie,Y.G.Xie,Y.H.Xie,T.Y.Xing,G.F.Xu,Q.J.Xu,W.Xu,X.P.Xu,F.Yan,L.Yan,W.B.Yan,W.C.Yan,Xu Yan,H.J.Yang,H.X.Yang,L.Yang,S.L.Yang,Y.X.Yang,Yifan Yang,Zhi Yang,M.Ye,M.H.Ye,J.H.Yin,Z.Y.You,B.X.Yu,C.X.Yu,G.Yu,J.S.Yu,T.Yu,C.Z.Yuan,L.Yuan,X.Q.Yuan,Y.Yuan,Z.Y.Yuan,C.X.Yue,A.Yuncu,A.A.Zafar,Y.Zeng,B.X.Zhang,Guangyi Zhang,H.Zhang,H.H.Zhang,H.Y.Zhang,J.J.Zhang,J.L.Zhang,J.Q.Zhang,J.W.Zhang,J.Y.Zhang,J.Z.Zhang,Jianyu Zhang,Jiawei Zhang,L.Q.Zhang,Lei Zhang,S.Zhang,S.F.Zhang,Shulei Zhang,X.D.Zhang,X.Y.Zhang,Y.Zhang,Y.H.Zhang,Y.T.Zhang,Yan Zhang,Yao Zhang,Yi Zhang,Z.H.Zhang,Z.Y.Zhang,G.Zhao,J.Zhao,J.Y.Zhao,J.Z.Zhao,Lei Zhao,Ling Zhao,M.G.Zhao,Q.Zhao,S.J.Zhao,Y.B.Zhao,Y.X.Zhao,Z.G.Zhao,A.Zhemchugov,B.Zheng,J.P.Zheng,Y.Zheng,Y.H.Zheng,B.Zhong,C.Zhong,L.P.Zhou,Q.Zhou,X.Zhou,X.K.Zhou,X.R.Zhou,A.N.Zhu,J.Zhu,K.Zhu,K.J.Zhu,S.H.Zhu,T.J.Zhu,W.J.Zhu,W.J.Zhu,Y.C.Zhu,Z.A.Zhu,B.S.Zou,J.H.Zou.Study of BESIII trigger efficiencies with the 2018 J/ψ data[J].Chinese Physics C,2021,45(2):48-55. 被引量:36
  • 10马楚焱,刘国强,李超.对PICO和RECTANGLE的零相关线性分析[J].密码学报,2017,4(5):413-422. 被引量:5

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部