期刊文献+

轻量级分组密码Piccolo的积分攻击 被引量:2

Integral attack of light weight block cipher Piccolo
下载PDF
导出
摘要 为了评估分组密码Piccolo的积分性质,提出Piccolo算法的5轮积分区分器,对无白化密钥的Piccolo进行了7轮和8轮攻击。其中,7轮攻击的数据复杂度为2^(17)个明文,时间复杂度为2^(20. 368)次7轮加密,8轮攻击的复杂度分别为2^(18)和2^(53. 000)。随后,将5轮区分器向解密方向扩展2轮,得到7轮区分器,对Piccolo进行了9轮攻击。若考虑白化密钥,数据复杂度为2^(48)个明文,时间复杂度为2^(52. 237)次9轮加密;若无白化密钥,复杂度均为2^(48)。据现有资料,这是首次评估Piccolo算法在积分攻击方面的安全性。 To evaluate block cipher Piccolo’s integral property,this paper first proposed a 5-round integral distinguisher of Piccolo,and used it to attack 7-round and 8-round on Piccolo which without whitening keys.The data complexity of the 7-round ana-lysis was 2 17 plaintexts,the time complexity was 2 20.368 times 7-round encryptions,and the complexity of 8-round analysis was 2 18 and 2 53.000 respectively.Then,it extended the 5-round distinguisher to another 2-round in the decryption direction and obtained a 7-round distinguisher,and attacked 9-round on Piccolo based on it.If there were whitening keys,the data complexity was 2 48 plaintexts,and the time complexity was 2 52.237 times 9-round encryptions,else the complexity was 2 48.According to the available information,it’s the first assessment of the Piccolo algorithm in terms of integral attack security.
作者 李艳俊 石宇婷 Li Yanjun;Shi Yuting(Dept.of Information Security,Beijing Electronic Science&Technology Institute,Beijing 100070,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第11期3413-3417,3440,共6页 Application Research of Computers
基金 中央高校基本科研业务费资助项目(2017LG04)
关键词 轻量级分组密码 Piccolo 积分攻击 部分和技术 lightweight block cipher Piccolo integral attack partial sum technique
  • 相关文献

参考文献5

二级参考文献14

  • 1孙兵,李瑞林,屈龙江,李超.对低代数次数分组密码的SQUARE攻击[J].中国科学:信息科学,2010,40(6):777-785. 被引量:3
  • 2吴文玲,卫宏儒.低轮FOX分组密码的碰撞-积分攻击[J].电子学报,2005,33(7):1307-1310. 被引量:11
  • 3DAEMEN J, KNUDSEN L R, RLIMEN V. The block cipher SQUARE[A]. FSE 1997[C]. LNCS 1267, 1997, 149-165.
  • 4SCHNEIER B, KELSEY J, WHIT/NG D, et al. The Twofish Encryption Algorithm: A 128-bit Block Cipher[M]. John Wiley & Sons, ISBN 0-471-35381-7, USA, 1999.
  • 5LUCKS S. The saturation attack-a bait for twofish[A]. FSE 2001[C]. Japan, LNCS 2355, 2002.1-15.
  • 6SHIRAI T, SHIBUTANI K, AKISHITA T, et aL The 128-bit blockcipher CLEFIA[A]. FSE 2007[C].Luxembourg, LNCS 4593, 2007. 181-195.
  • 7SONY Corporation. The 128-blt blockcipher CLEFIA: algorithm specification [EB/OL]. http://www.sony.net/Products/clefia/technical/ data/clefia-spec- 1.0.pdf. 2007.
  • 8SONY Corporation. The 128-bit blockcipher CLEFIA: security and performance evaluations [EB/OL]. http://www.sony.net/Products/clefia/technical/data/clefia-eval- 1.0.pdf. 2007.
  • 9TSUNOO Y, TSUJIHARA E, SHIGERI M, et al. Impossible differential cryptanalysis of CLEFIA[A]. FSE 2008[C]. Switzerland, LNCS 5086, 2008. 398-411.
  • 10WANG W, WANG X Y. Improved impossible differential cryptanalysis of CLEFIA[EB/OL]. http://eprint.iacr.org/2007/466.2007.

共引文献33

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部