期刊文献+

基于神经区分器的KATAN48算法条件差分分析方法

Conditional differential cryptanalysis method of KATAN48 algorithm based on neural distinguishers
下载PDF
导出
摘要 针对KATAN48算法的安全性分析问题,提出了一种基于神经区分器的KATAN48算法条件差分分析方法。首先,研究了多输出差分神经区分器的基本原理,并将它应用于KATAN48算法,根据KATAN48算法的数据格式调整了深度残差神经网络的输入格式和超参数;其次,建立了KATAN48算法的混合整数线性规划(MILP)模型,并用该模型搜索了前加差分路径及相应的约束条件;最后,利用多输出差分神经区分器,至多给出了80轮KATAN48算法的实际密钥恢复攻击结果。实验结果表明,在单密钥下,KATAN48算法的实际攻击的轮数提高了10轮,可恢复的密钥比特数增加了22比特,数据复杂度和时间复杂度分别由2^(34)和2^(34)降至2^(16.39)和2^(19.68)。可见,相较于前人单密钥下的实际攻击,所提方法能够有效增加攻击轮数和可恢复的密钥比特数,同时降低攻击的计算复杂度。 Aiming at the security analysis problem of KATAN48 algorithm,a conditional differential cryptanalysis method of KATAN48 algorithm based on neural distinguishers was proposed.First,the basic principle of multiple output differences neural distinguishers was studied and applied to KATAN48 algorithm.According to the data format of KATAN48algorithm,the input format and hyperparameters of the deep residual neural network were adjusted.Then,the Mixed-Integer Linear Programming(MILP) model of KATAN48 algorithm was established to search the prepended differential paths and the corresponding constraint conditions.At last,using the multiple output differences neural distinguishers,at most 80-round of the practical key recovery attack results of KATAN48 algorithm were given.Experimental results show that in the single key setting,the number of practical attack rounds of KATAN48 algorithm is increased by 10 rounds,the number of recoverable key bits of KATAN48 algorithm is increased by 22 bit and the data complexity and time complexity of KATAN48 algorithm are reduced from 2~(34) and 2~(34) to 2~(16.39) and 2~(19.68) respectively.Compared to the previous practical attack at the single-key setting,the proposed method can effectively increase the number of attack rounds and recoverable key bits,and reduces the computational complexity of attack.
作者 林东东 李曼曼 陈少真 LIN Dongdong;LI Manman;CHEN Shaozhen(School of Cyber Security,Information Engineering University,Zhengzhou Henan 450001,China;State Key Laboratory of Cryptography(State Cryptography Administration),Beijing 100878,China)
出处 《计算机应用》 CSCD 北大核心 2023年第8期2462-2470,共9页 journal of Computer Applications
基金 河南省自然科学基金资助项目(232300421394)。
关键词 分组密码 混合整数线性规划 KATAN算法 条件差分分析 神经区分器 block cipher Mixed-Integer Linear Programming(MILP) KATAN algorithm conditional differential cryptanalysis neural distinguisher
  • 相关文献

参考文献2

二级参考文献9

  • 1De Canni’’ere,C,Dimkelman,O,Knezevi’’c,M.KATAN and KTANTAN—A family of Small and Efficient Hardware-Oriented Block Ciphers. CHES 2009 . 2009
  • 2Albrecht,M.R,Leander,G.An All-in-one Approach to Differential Crypt-analysis for Small Block Ciphers. SAC 2012 . 2013
  • 3S. Knellwolf,W. Meier,M. Naya-Plasencia.Conditional Differential Cryptanalysis of Trivium andKATAN. Selected Areas in Cryptography . 2012
  • 4Bogdanov A,Rechberger C.A3-subset meet-in-the-middle attack: cryptanalysis of thelightweight block cipher KTANTAN. Selected Areas in Cryptography . 2011
  • 5S. Knellwolf,W. Meier,M. Naya-Plasencia.Conditional Differential Cryptanalysis of NLFSR-BasedCryptosystems. ASIACRYPT2010 . 2010
  • 6Isobe T,Sasaki Y,Chen J.Related-Key Boomerang Attacks on KATAN32/48/64. Information Security and Privacy . 2013
  • 7Isobe T,Shibutani K.All subkeys recovery attack on block ciphers:extending meet-in-the-middle approach. Selected Areas in Cryptography—SAC 2013 . 2013
  • 8陈刚,关楠,吕鸣松,王义.实时多核嵌入式系统研究综述[J].软件学报,2018,29(7):2152-2176. 被引量:41
  • 9陈桂林,马胜,郭阳.硬件加速神经网络综述[J].计算机研究与发展,2019,56(2):240-253. 被引量:17

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部