期刊文献+

基于SAT的线性扩散层分支数的快速计算方法

Fast Evaluation Method of Branch Number of Linear Diffusion Layer Based on SAT
下载PDF
导出
摘要 将线性扩散层差分和线性分支数的计算问题转化为布尔可满足性问题(Boolean Satisfiability Problem,SAT),提出了一种通用的快速计算分组密码线性扩散层分支数的方法,该方法可以在较短的时间内求解出分组大于32比特线性扩散层的分支数。为了检验本方法的实际应用效果,测试了一批随机构造的循环异或(Rotation-XOR,RX)结构分组为64比特线性扩散层的分支数。结果显示,所提方法均能在较短的时间内计算出分支数,并且当线性扩散层的分组为64比特、分块为8、异或项数为9时,首次得到分支数达到8的RX结构的扩散层。 In order to transform the calculation problem of differential and linear branch number of linear diffusion layer into SAT problem,a general and fast method to evaluate the branch number of linear diffusion layer in block cipher is proposed.This method can solve the linear diffusion branch number problem with blocks greater than 32 bits in a relatively short time.In order to test the practical application effect of this method,a batch of randomly constructed RX(Rotation-XOR)structures grouped into 64-bit linear diffusion layers are tested.The results indicate that the proposed method can calculate the branch number in a short time,and when the grouping of the linear diffusion layer is 64 bits,divided into 8 bytes,and the number of XOR items is 9,the diffusion layer of the RX structure with a branch number of 8 is obtained for the first time.
作者 苗旭东 张晶 胡建勇 董新锋 张文政 MIAO Xudong;ZHANG Jing;HU Jianyong;DONG Xinfeng;ZHANG Wenzheng(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2022年第5期634-639,共6页 Communications Technology
基金 四川省科技计划(2020JDJQ0076)。
关键词 布尔可满足性问题 线性扩散层 分支数 循环异或 SAT method linear diffusion layer branch number rotation-XOR
  • 相关文献

参考文献6

二级参考文献40

  • 1崔灵果,曹元大.SPN分组密码中最优扩散层的构造与验证[J].计算机应用,2005,25(4):856-858. 被引量:2
  • 2杜生辉,阮传概.分组密码及其研究[J].通信技术与发展,1995(4):45-49. 被引量:4
  • 3王念平,金晨辉,余昭平.对合型列混合变换的研究[J].电子学报,2005,33(10):1917-1920. 被引量:10
  • 4国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http://www.oscca.gov.cn/UpFil/200622026423297990.pdf.
  • 5Schneier B, Kelsey J, and Whiting D, et al.. Twofish: A 128-bit block cipher. Available at http://www.schneier.com/, 2007-2-2.
  • 6Wang Mei-qin. Differential cryptanalysis of present. Cryptology ePrint Archive, Report 2007/408.
  • 7Wu Wen-ling, Zhang Wen-tao, and Feng Deng-guo. Impossible differential cryptanalysis of reduce round ARIA and camellia. Journal of Computer Science and Technology, 2007, 22(3): 449-456.
  • 8Daemen J. Cipher and hash function design strategies based on linear and differential cryptanalysis. [Ph.D. dissertation], KU, Leuven, 1995.
  • 9Kang Ju-sung, Hong Seokhie, and Lee Sangjin, et al.. Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks. ETRI Journal, 2001, 23(4): 158-167.
  • 10Xiao L and Heys H. Hardware design and analysis of block cipher components. Proceedings of the 5th International Conference on Information Security and Cryptology- ICISC'02, 2003 LNCS 2587: 164-181.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部