期刊文献+

CHAM算法的安全性分析

Security Analysis of CHAM Cipher
下载PDF
导出
摘要 本文主要研究基于ARX结构的轻量级分组密码CHAM算法,利用不可能差分分析、零相关线性分析对其进行安全性分析.首先,利用线性不等式组对算法的每个组件进行等价刻画,描述了差分特征和线性掩码的传播规律,建立了基于MILP(混合整数规划问题)的不可能差分和零相关线性自动化搜索模型.其次,根据CHAM算法四分支广义Feistel结构的特点,得到CHAM算法特定形式(输入或者输出差分(掩码)仅含有一个非零块)下的最长不可能差分路径和零相关线性路径具有的性质,优化了搜索策略,缩小了搜索空间.最后,利用搜索算法,遍历特定的输入输出集合,共得到CHAM-64的5条19轮不可能差分区分器,CHAM-128的1条18轮不可能差分区分器和15条19轮零相关线性区分器,均为目前公开发表的最长同类型区分器. This paper analyzes the security of ARX structure cipher CHAM by impossible difference analysis and zero-correlation linear analysis. Firstly, each component of the cipher is characterized equivalently by using a set of linear inequalities. The propagation characteristics of the differential features and linear masks are described, then an MILP(Mixed Integer Linear Programming) impossible differential and zero-correlation linear automated search model are established. Secondly, according to the characteristics of the four-branch generalized Feistel structure of CHAM, the properties of the longest impossible differential path and zero-correlated linear path in the specific form(the input or output differential contains only one non-zero block) of CHAM are obtained, the search strategy is optimized, and the search space is reduced. Finally, by using the search algorithm, traversing a specific set of inputs and outputs, five 19-round impossible differential distinguishers of CHAM-64,one 18-round impossible differential distinguisher of CHAM-128 and fifteen 19-round zero-correlation linear distinguishers of CHAM-128 are found, they are the longest publicly available distinguishers of the same type known so far.
作者 陈少真 李航 付志新 任炯炯 CHEN Shao-Zhen;LI Hang;FU Zhi-Xin;REN Jiong-Jiong(PLA Strategic Support Force Information Engineering University,Zhengzhou 450001,China;State Key Laboratory of Cryptology,Beijing 100878,China)
出处 《密码学报》 CSCD 2021年第1期124-131,共8页 Journal of Cryptologic Research
基金 数学工程与先进计算国家重点实验室开放课题(2018A03) 国家密码发展基金(MMJJ20180203) 信息保障技术重点实验室开放课题(KJ-17-002)。
关键词 轻量级分组密码 CHAM算法 自动化搜索 lightweight block cipher CHAM automated search
  • 相关文献

参考文献1

二级参考文献4

  • 1Eli Biham,Adi Shamir.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology.1991(1)
  • 2Long Wen,Meiqin Wang,Andrey Bogdanov,Huaifeng Chen.Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard[J].Information Processing Letters.2014(6)
  • 3Andrey Bogdanov,Vincent Rijmen.Linear hulls with correlation zero and linear cryptanalysis of block ciphers[J].Designs Codes and Cryptography.2014(3)
  • 4Eli Biham.New types of cryptanalytic attacks using related keys[J].Journal of Cryptology.1994(4)

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部