期刊文献+

LowMC实例的差分枚举攻击效果分析

Effect of the difference enumeration attack on LowMC instances
下载PDF
导出
摘要 LowMC是具有低乘法复杂度特征的算法。针对低数据量和少量S盒参数下的LowMC实例,差分枚举攻击被提出,理论上可以攻击全轮LowMC算法。考虑到这种攻击是在线性层完全随机的条件下给出的,对LowMC算法在真实的线性层下抵抗差分枚举攻击的强度进行了研究。通过对关键起始轮数的研究发现,差分枚举攻击并非总是可以达到理论攻击轮数。对于某一些关键起始轮数比理论值小的LowMC实例,差分枚举攻击甚至会失败。由于LowMC算法的轮数设置基于现有攻击的效果,该分析对LowMC算法的轮数设计具有重要意义。 The LowMC is an algorithm with low multiplicative complexities.For the parameter with limited data complexities and low number of S-boxes,the difference enumeration attack was proposed,which could theoretically attack all rounds of the LowMC.Considering that the original attack is based on the random linear layer,the strength of LowMC algorithm against differential enumeration attacks under a specific linear layer deserves more study.The difference enumeration attack cannot reach theoretical rounds through the research on the so-called key initial round.In terms of some LowMC instances,the key initial round is smaller than the theoretical value,which leads to the failure of the difference enumeration attack.Since the number of rounds of the LowMC is completely based on ex-isting attacks,the analysis is of great significance to the rounds design of the LowMC.
作者 葛欣欣 李智虎 王美琴 胡凯 GE Xinxin;LI Zhihu;WANG Meiqin;HU Kai(School of Cyber Science and Technology,Shandong University,Qingdao 266237,China;Key Laboratory of Cryptologic Technology and Information Security,Ministry of Education,Shandong University,Qingdao 266237,China;China Electric Power Research Institute,Beijing 100192,China)
出处 《网络与信息安全学报》 2021年第3期149-155,共7页 Chinese Journal of Network and Information Security
基金 国家自然科学基金(62002201,62032014) 国家重点研发计划(2018YFA0704702) 山东省重大科技创新项目(2019JZZY010133) 山东省自然科学基金重大基础研究项目(ZR202010220025)。
关键词 分组密码 LowMC算法 差分枚举攻击 关键起始轮数 block cipher LowMC algorithm difference enumeration attack key initial round
  • 相关文献

参考文献2

二级参考文献12

  • 1吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:20
  • 2Kwon D, Kim J, and Park S, et al.. New block cipher: ARIA[C]. ICISC 2003, LNCS 2971: 432-445.
  • 3Biryukov A, Canniere D C, and Lano J, et al.. Security and performance analysis of ARIA. Version 1.2. Dept. Electrical Engineering-ESAT/S CD-COSIC Katholieke Universiteit Leuven Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium Jan. 7. 2004.
  • 4Fleischmann E, Gorski M, and Lucks S. Attacking reduced rounds of the ARIA block cipher. Cryptology ePrint Archive: Report 2009/334, http://eprint.iacr.org/2009/334. 2009.
  • 5Fleischmann E, Forler C, and Gorski M, et al.. New boomerang attacks on ARIA[C]. INDOCRYPT 2010, LNCS 6498: 163-175.
  • 6Li Yan-jun, Wu Wen-ling, and Zhang Lei. Integral attacks on reduced-round ARIA block cipher[C]. ISPEC 2010, LNCS 6047: 19-29.
  • 7Tang Xue-hai, Sun Bing, and Li Rui-lin, et al.. A meet-in- the-middle attack on ARIA. Cryptology ePrint Archive:Report 2010/168, http://eprint.iacr.org/2010/168. 2010.
  • 8Demirci H, Selcuk A A, and Ture E. A new meet-in-the- middle attack on the IDEA Block Cipher[C]. SAC 2003, LNCS 3006: 117-129.
  • 9Demirci H and Selcuk A A. A meet-in-the-middle attack on 8-round AES[C]. FSE 2008, LNCS 5086: 116-126.
  • 10Dunkelman O, Keller N, and Shamir A. Improved single-key attacks on 8-round AES. Cryptology ePrint Archive: Report 2010/322, http://eprint.iaer.org/2010/322. 2010.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部