期刊文献+

3D密码的不可能差分攻击 被引量:11

Impossible Differential Attack on 3D Cipher
在线阅读 下载PDF
导出
摘要 3D密码是在CANS2008上提出的一个新的分组密码算法,与以往的分组密码算法不同,它采用了3维结构。密码设计者给出了3D密码的一个5轮不可能差分并对6轮3D密码进行了不可能差分攻击。该文通过3D密码的结构特性找到了新的6轮不可能差分。基于新的不可能差分和3D密码的等价结构,可以对7轮和8轮3D密码进行有效的不可能差分攻击。此外,结合其密钥扩展规则,可以将攻击轮数提高至9轮。该文的攻击结果优于密码设计者的结果。 3D cipher is a new block cipher proposed in CANS2008.It is different from all known block cipher as it uses the three dimension structure.The designers give out a 5-round impossible differential and make an impossible differential attack on 6-round 3D cipher.In this paper,some new 6-round impossible differentials are found according to its structure properties.Based on these new impossible differentials and the equivalent structure of 3D cipher,effective impossible differential attacks can be made on 7 and 8-round 3D cipher.Moreover,according to some properties of the key schedule,these attacks can be extended to 9-round 3D cipher.These attack results are better than the designer's.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第10期2516-2520,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60803156) 信息安全国家重点实验室开放基金(01-07)资助课题
关键词 分组密码 3D密码 不可能差分攻击 Block cipher 3D cipher Impossible differential attack
  • 相关文献

参考文献9

  • 1Nakahara J Jr.3D:A three-dimensional block cipher[C].CANS 2008,Springer-Verlag,2008,LNCS 5339:252-267.
  • 2Biham E,Biryukov A,and Shamir A.Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C].EUROCRYPT'99,Springer-Verlag,1999,LNCS 1592:12-23.
  • 3Nakahara J Jr and Ivan Carlos Pavao.Impossible-differential attacks on large-block rijndael[C].ISC 2007,Springer-Verlag,2007,LNCS 4779:104-117.
  • 4Zhang Wen-tao,Wu Wen-ling,and Feng Deng-guo.New results on impossible differential cryptanalysis of reduced AES[C].ICISC 2007,Springer-Verlag,2007,LNCS 4817:239-250.
  • 5吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:22
  • 6Lu Ji-qiang and Kim J,et al..Improving the efficiency of impossible differential cryptanalysis of reduced camellia and MISTY1[C].CT-RSA 2008,Springer-Verlag,2008,LNCS 4964:370-386.
  • 7Tsunoo Y,Tsujihara E,and Shigeri M,et al..Impossible differential cryptanalysis of CLEFIA[C].FSE 2008,Springer-Verlag,2008,LNCS 5086:398-411.
  • 8王薇,王小云.CLEFIA-128/192/256的不可能差分分析(英文)[J].软件学报,2009,20(9):2587-2596. 被引量:5
  • 9Zhang Wen-ying and Han Jing.Impossible differential cryptanalysis of reduced round CLEFIA[C] ,Inscrypt 2008,Springer-Verlag,2009,LNCS 5487:181-191.

二级参考文献10

  • 1吴文玲.Pseudorandomness of Camellia-Like Scheme[J].Journal of Computer Science & Technology,2006,21(1):82-88. 被引量:6
  • 2Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stern J, ed. Advances in Cryptology---EUROCRYPT'99. LNCS 1592, Berlin: Springer-Verlag, 1999.12-23.
  • 3Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T. The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov A, ed. Proc. of the Fast Software Encryption (FSE 2007). LNCS 4593, Berlin: Springer-Verlag, 2007. 181-195.
  • 4Sony Corporation. The 128-bit blockcipher CLEFIA: Algorithm specification. Revision 1.0, On-Line document, 2007. http://www.sony.net/Products/clefia/technical/data/cle fia-spec- 1.0.pdf.
  • 5Sony Corporation. The 128-bit blockcipher CLEFIA: Security and performance evaluations. Revision 1.0, On-Line document, 2007. http://www.sony.co.jp/Products/clefia/technical/data/clefia-eval-l.0.pdf.
  • 6Chen H, Wu WL, Feng DG. Differential fault analysis on CLEFIA. In: Qing S, Imai H, Wang G, eds. Proc. of the Int'I Conf. on Information and Communications Security (ICICS 2007). LNCS 4861, Berlin: Springer-Verlag, 2007. 284-295.
  • 7Tsunoo Y, Tsujihara E, Shigeri M, Saito T, Suzaki T, Kubo H. Impossible differential cryptanalysis of CLEFIA. In: Nyberg K, ed. Proc. of the Fast Software Encryption (FSE 2008). LNCS 5086, Berlin: Springer-Verlag, 2008. 398-411.
  • 8Wang W, Wang XY. Improved impossible differential cryptanalysis of CLEFIA. Report 2007/466. Cryptology ePrint Archive, 2007. http://eprint.iacr.org/2007/466.
  • 9Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991,4(1):3-72.
  • 10Menezes AJ, Oorschot PC, Vanstone SA. Handbook of Applied Cryptography. 5th ed., CRC Press, 2001. 369-370.

共引文献24

同被引文献92

  • 1吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:22
  • 2Biham E, Biryukov A, and Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]. EUROCRYPT*99, Springer-Verlag, 1999, LNCS 1592: 12-23.
  • 3Zhang Wen-tao, Wu Wen-ling, and Feng Deng-guo. New results on impossible differential cryptanalysis of reduced AES[C]. ICISC 2007, Springer-Verlag, 2007, LNCS 4817: 239-250.
  • 4Shirai T, Shibutani K, and Akishita T, et al.. The 128-bit blockcipher CLEFIA[C]. FSE 2007, LNCS 3017: 181-195.
  • 5Zhang Wen-ying and Han Jing. Impossible differential cryptanalysis of reduced round CLEFIA[C]. Inscrypt 2008, Springer-Verlag, 2009, LNCS 5487: 181-191.
  • 6Kim Jongsung, Hong Seokhie, and Lim Jongin. Impossible differential cryptanalysis using matrix method[J]. Discrete Mathematics, 2010, 310(5): 988-1002.
  • 7Luo Yi-yuan, Wu Zhong-ming, and Led Xue-jia. A unified method for finding impossible differentials of block cipher structures[R].Cryptology ePrint Archive, Report 2009/627.
  • 8Wei Yue-chuan, Li Ping, Sun Bing, et al.. Impossible differential cryptanalysis on Feistel ciphers with SP and SPS round functions[C]. Applied Cryptography and Network Security, Springer-Verlag, 2010, LNCS 6123: 105-122.
  • 9Li Rui-lin, Sun Bing, and Li Chao. Impossible differential cryptanalysis of SPN ciphers[R]. Cryptology ePrint Archive, Report 2010/307.
  • 10Bogdanov A and Rijmen V. Zero-correlation linear cryptanalysis of block cipher[R]. Cryptology ePrint Archive, Report 2011/123.

引证文献11

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部