期刊文献+

基于MILP的MGFN全轮差分分析及改进

Differential analysis and improvement of full-round MGFN based on MILP
下载PDF
导出
摘要 研究了轻量级分组密码MGFN算法的抗差分分析能力并提出了改进方法。首先,基于MILP工具对MGFN算法建模,搜索迭代差分并构造了全轮差分路径,整体差分概率为2-40,远远大于随机置换的差分概率。然后,给出S盒的差分分支数概念并将其作为衡量差分安全性的指标,以新S盒替代原MGFN算法的S盒,并修改了密钥扩展算法,提出新的MGFN-P算法。最后,通过差分路径搜索和分析比较,说明了MGFN-P算法比原MGFN算法更安全、高效。 This article investigated the MGFN algorithm’s ability to resist differential analysis and proposed improved methods.First of all,it modeled this algorithm based on the MILP,and then got a 6-round iterative differential and a full round differential path with a total probability of 2-40,which was much larger than the differential probability of random permutation.Secondly,it gave the branch number of the S-box as an indicator to measure its differential safety.This paper also replaced the S-box of MGFN algorithm with a new S-box and proposed a new MGFN-P algorithm by modifying the key extension algorithm.Finally,differential path search and analysis show that MGFN-P algorithm is more secure and efficient than the original algorithm.
作者 李艳俊 毕鑫杰 项勇 林怡平 Li Yanjun;Bi Xinjie;Xiang Yong;Lin Yiping(Information Industry Information Security Evaluation Center,The 15th Research Institute of China Electronics Technology Group Corporation,Beijing 100083,China;Dept.of Cryptologic Science&Technology,Beijing Institute of Electronic Science&Technology,Beijing 100070,China;Dept.of Cyberspace Security,Beijing Institute of Electronic Science&Technology,Beijing 100070,China)
出处 《计算机应用研究》 CSCD 北大核心 2024年第3期911-915,922,共6页 Application Research of Computers
基金 北京市自然科学基金资助项目(4234084)。
关键词 MGFN 轻量级分组密码 MILP 差分分析 分支数 MGFN lightweight block cipher MILP differential analysis branch number
  • 相关文献

参考文献5

二级参考文献29

  • 1V Rijmen, J Daemen. The cipher Shark. In: E Biham ed. The 4th Int'l Workshop on Fast Software Encryption FSE' 97,LNCS 1267. Berlin: Springer-Verlag, 1997. 137~151
  • 2S L M Barreto, V Rijmen. The Anubis block cipher. http:∥www. cosic. esat. kuleuven. ac. be/nessie/, 2000
  • 3NESSIE report: Report on the performance evaluation of NESSIE candidates I. http:∥ www. cosic. esat. kuleuven. ac. be/nessie,2001
  • 4J S Kang, S Hong, S Lee. Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks. ETRI Journal, 2001, 23(4): 158~167
  • 5K Ohkuma, H Shimizu, F Sano. Security assessment of Hierocrypt and Rijndael against the differential and linear cryptanalysis. The 2nd NESSIE Workshop, Egham, USA,2001. http:∥citeseer. nj. nec. com/ohkuma01 security. html
  • 6K Aoki. Strict evaluation of the maximum average of differential probability and the maximum average of linear probability. IEICE Trans on Fundamentals, 1997, E-80-A(1): 2~8
  • 7M Luby, C Rackoff. How to construct pseudorandom permutations from pseudorandom functions. Journal of Computing (Society for Industrial and Applied Mathematics), 1988, 17(2):373~386
  • 8E Biham, A Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991, 4( 1 ): 3~72
  • 9M Matsui. Linear cryptanalysis method for DES cipher. In: T Helleseth ed. Advances in Cryptology-Eurocrypt'93, LNCS 765.Berlin: Springer-Verlag, 1994. 386~397
  • 10X Lai, J L Massey, S Murphy. Markov ciphers and differential cryptanalysis. In: D Davies ed. Advances in CryptologyEurocrypt'91, LNCS 547. Berlin: Springer-Verlag, 1991. 17~38

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部