期刊文献+

AC分组密码的差分和线性密码分析 被引量:5

Differential and Linear Cryptanalysis of AC Block Cipher
下载PDF
导出
摘要 讨论AC分组密码对差分和线性密码分析的安全性,通过估计3轮AC的差分活动盒子的个数下界和12轮AC的线性活动盒子的个数下界,本文得到AC的12轮差分特征概率不大于2-128和线性逼近优势不大于2-67.因此,AC分组密码对差分和线性密码分析是安全的. The security of AC block cipher against differential and linear cryptanalysis is discussed. It is shown that 12-round AC has no differential characteristic with probability higher than 2-128 and no linear approximations with approximation bias larger than 2-67 by estimating the lower bound of the number of active-boxes in 3-round differential characteristic and 12-round linear approximation. Hence, AC block cipher is secure to differential and linear cryptanalysis.
出处 《软件学报》 EI CSCD 北大核心 2003年第3期569-574,共6页 Journal of Software
基金 Supported by the National Natural Science Foundation of China under Grant Nos.60103023 60083007 (国家自然科学基金)
关键词 AC分组密码 线性密码分析 差分密码分析 线性逼近 S-盒 密码学 Approximation theory Numerical analysis Probability
  • 相关文献

参考文献1

二级参考文献12

  • 1[1]RIJNDAEL.RC6,Serpent[EB/OL].http://www.nist.gov/aes.2000.
  • 2[2]NOEKEON.NUSH[EB/OL].http://www.cryptonessie.org,2000.
  • 3[3]BIHAM E,SHAMIR A.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology,1991,4(1):3-72.
  • 4[4]MATSUI M.Linear cryptanalysis method for DES cipher[A].Advances in Cryptology-EUROCRYPT'93 Proceedings[C].Berlin: Springer-Verlag,1994.386-397.
  • 5[5]KNUDSEN L R.Truncated and higher order differentials[A].Fast Software Encryption,2th International Workshop Proceedings[C].Berlin: Springer-Verlag,1995.196-211.
  • 6[6]LAI X.Higher order derivations and differential cryptanalysis[A].Proc Symposium on Communication,Coding and Cryptography[C].Monte-erita,Ascona,Switzerland,1994.
  • 7[7]BIHAM E,BIRYUKOV A,SHAMIR A.Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[EB/OL].http://www.cryptography.com,1999.
  • 8[8]JAKOBSEN T.The interpolation attack on block cipher[A].Fast Software Encryption,4th International Workshop Proceedings[C].Springer-Verlag,1997.
  • 9[9]BIHAM E.New types of cryptanalytic attacks using related keys[J].Journal of Cryptology,1994,7(4):229-246.
  • 10[10]WAGNER D.The boomerang attack[A].Fast Software Encryption,6th International Workshop Proceedings[C].Berlin: Springer- Verlag,1999.

共引文献4

同被引文献29

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部