期刊文献+

改进的10轮Kalyna-128/256中间相遇攻击

Improved meet-in-the-middle attacks on 10-round Kalyna-128/256
下载PDF
导出
摘要 分组密码Kalyna在2015年6月被确立为乌克兰的加密标准,它的分组长度为128 bit、256 bit和512 bit,密钥长度与分组长度相等或者是分组长度的2倍,记为Kalyna-b/2b。为了保证该算法在实际环境中能安全使用,必须对其抵抗当下流行的攻击方法中的中间相遇攻击的能力进行评估。通过研究Kalyna-128/256轮密钥之间的线性关系,再结合多重集、差分枚举和相关密钥筛选等技巧构造了四条6轮中间相遇区分器链,在此区分器前端接1轮后端接3轮,再利用时空折中实现了对10轮Kalyna-128/256的中间相遇攻击,攻击所需的数据、时间和存储复杂度分别为2111个选择明文、2238.63次10轮加密和2222个128 bit块。将之前10轮Kalyna-128/256中间相遇攻击最优结果的数据、时间和存储复杂度分别降低了24倍、214.67倍和226.8倍。 The Kalyna block cipher has recently been selected as the Ukranian encryption standard in June,2015.It supports block sizes of 128 bit,256 bit,and 512 bit,and key sizes of 128 bit,256 bit,and 512 bit.Among them,the key size can be equal to or twice as the block length,denoted by Kalyna-b/2 b.In order to apply it safely in the real systems,the researchers should evaluate the security of Kalyna against the meet-in-the-middle attack which is one of the currently popular attacks.This paper researched the key schedule of Kalyna-128/256 to obtain some linear relationships among round keys.Based on them,it constructed four 6-round distinguishers by using multisets,differential enumerations and key-dependent sieve techniques.Through appending one round at its top and three rounds at its bottom,it mounted a meet-in-the-middle attack on 10-round Kalyna-128/256.In order to reduce the time complexity of online phase,it applied the time-memory tradeoff technique.Finally,the data,time and memory complexities of attack are 2111 chosen plaintexts,2238.638-round encryptions and 2222128 bit blocks,respectively.The results show that compared with the previously best known meet-in-the-middle attack on 10-round Kalyna-128/256,the data,time and memory complexities are reduced by 24 times,214.67 times and 226.8 times,respectively.
作者 刘亚 占婷婷 姒宏明 李玮 刘志强 Liu Ya;Zhan Tingting;Si Hongming;Li Wei;Liu Zhiqiang(College of Optical-Electronic&Computer Engineering,University of Shanghai for Science&Technology,Shanghai 200093,China;Shanghai Key Laboratory of Modern Optical System,University of Shanghai for Science&Technology,Shanghai 200093,China;Dept.of Computer Science&Engineering,Shanghai Jiao Tong University,Shanghai 200240,China;School of Computer Science&Technology,Donghua University,Shanghai 201620,China;Shanghai Key Laboratory of Integrate Administration Security,Shanghai 200240,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第7期2112-2116,2122,共6页 Application Research of Computers
基金 国家“十三五”密码发展基金理论课题资助项目(MMJJ20180202) 信息保障技术重点实验室开放基金资助项目(KJ-17-008)。
关键词 Kalyna 多重集 中间相遇攻击 Kalyna multiset meet-in-the-middle attacks
  • 相关文献

参考文献4

二级参考文献6

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部