期刊文献+

对简化轮数的Crypton算法的中间相遇攻击 被引量:3

A Meet-in-the-Middle Attack on Reduced-Round Crypton
下载PDF
导出
摘要 Crypton算法是一种SPN型分组密码,它是分组长度为128 bit的AES候选算法之一。本文借助于多重集的概念,评估了简化轮数的Crypton算法对中间相遇攻击的抵抗能力,设计出两类4/5轮区分器,对7/8/9轮的Crypton算法实施了攻击。所有的攻击实例都给出了复杂度分析,攻击结果表明9轮的Crypton算法对中间相遇攻击是不免疫的,而且新攻击有效地降低了攻击所需的数据复杂度。 Crypton, one of AES candidates, is a 128 bit block cipher of SPN structure proposed by Lim. By means of the concept of Multiset, this paper evaluates the security of the reduced-round Crypton against meet-in-the-middle at- tack, constructs two categories of distinguishers of 4/5 round used to the attack on Crypton algorithm of 7/8/9round. All the attack instances give the complexity analysis. The results demonstrate that Crypton reduced to 9 rounds is not im- mune to meet-in-the-middle attacks, and new attacks reduced the data complexity efficiently.
出处 《软件工程与应用》 2012年第2期17-23,共7页 Software Engineering and Applications
基金 内蒙古自治区科技创新引导奖励资金项目(2012) 国家自然科学基金项目(61174209) 信息安全国家重点实验室2011年开放课题(02-04-3)。
  • 相关文献

参考文献3

二级参考文献28

  • 1Nakahara J Jr.3D:A three-dimensional block cipher.CANS2008,Springer-Verlag,2008,LNCS 5339:252-267.
  • 2Nakahara J Jr.New impossible differential and known-keydistinguishers for the 3D cipher.ISPEC 2011,Springer-Verlag,2011,LNCS 6672:208-221.
  • 3Barreto P and Rijmen V.The anubis block cipher.http://www.sciencecentral.com/site/497719,2000,06.
  • 4Diffie W and Hellman M.Exhaustive cryptanalysis of theNBS data encryption standard.IEEE Computer,1977,10(6):74-84.
  • 5Demirci H and Selcuk A.A meet in the middle attack on8-round AES.FSE 2008,Springer-Verlag,2008,LNCS 5086:116-126.
  • 6Demirci H,Taskin I,Coban M,et al..Improved meet-in-the-middle attacks on AES.INDOCRYPT 2009,Springer-Verlag,2009,LNCS 5922:144-156.
  • 7Dunkelman O,Keller N,and Shamir A.Improved single-keyattacks on 8-round AES.ASIACRYPT 2010,Springer-Verlag,2010,LNCS 6477:158-176.
  • 8Wei Y,Lu J,and Hu Y.Meet-in-the-middle attacks on 8rounds of the AES block cipher under 192 key bits.ISPEC2011,Springer-Verlag,2011,LNCS 6672:222-232.
  • 9Lee C, Jun K, Jung M, et al.. Zodiwc version 1.0 (revised) architecture and specification[C]. Standardization Workshop on Information Security Technology, Korean Contribution on MP18033, ISO/IEC JTC1/SC27 N2563, 2000. http://www. kisa.or.kr/seed/index.html.
  • 10Hong D, Sung J, Moriai S, et al.. Impossible differential cryptanalysis of Zodiac [C]. FSE 2001, Springer-Verlag, 2002, LNCS 2355: 300-311.

共引文献19

同被引文献3

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部