期刊文献+

缩减轮数的Keccak杂凑函数差分特征 被引量:1

Differential Characteristic of Reduced-Round Keccak Hash Function
在线阅读 下载PDF
导出
摘要 研究了SHA-3标准算法Keccak轮函数的差分性质,给出了轮函数差分转移概率的计算方法,证明了轮函数差分转移概率关于z轴循环移位的相等性。根据轮函数的差分性质,提出了缩减轮数Keccak的差分特征寻找算法。最后,将得到的缩减轮数的差分特征与其它差分特征进行了比较,说明了本文的优势,并指出了文献[10]中的错误。 By analyzing the differential property of standard algorithm Keccak permutation, this pa- per proposes a calculation method of Keccak permutation differential properties, and proves that the differential properties of permutation are equal about circular displacement on z axis. On the basis of differential characteristic of permutation, an algorithm that searches the differential characteristic of reduced-round Keecak is put forward. And finally, this paper compares the result with other differ- ential path, introduces the superiority of this method, and points out the error in article[ 10].
出处 《信息工程大学学报》 2013年第1期22-29,共8页 Journal of Information Engineering University
关键词 杂凑函数 Keccak 差分分析 差分特征 Hash function Keccak differential analysis differential characteristic
  • 相关文献

参考文献10

  • 1NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family[EB/ OL]. [2010-10-10]. http ://csrc. nist. gov/groups/ST/hash/documents/FRNotice_Nov07. pdf.
  • 2Bertoni G, Daemen J, Peetcrs M, Van G Assche. The Keccak reference. Submission to NIST[EB/OL]. [2011-12-21]. http ://keccak. noekeon. org/Keccak-reference-3.0. pdf.
  • 3Bertoni G, Daemen J, Peeters M, Van G Assche. Cryptographic sponge functions[EB/OL]. [2011-12-21]. http://sponge. noekeon. org/CSF-0.1.pdf.
  • 4Wang X Y, Yu H B. How to break MD5 and other Hash Functions[C]//Eurocrypt'05. 2004:19-35.
  • 5Christina Boura, Anne Canteaut, Christophe De Canniere. Higher-order differential properties of Keccak and Luffa[EB/OL]. [ 2011-10-09 ]. http ://eprint. iacr. org/2011/023. pdf.
  • 6Mendel F, Rechberger C, Schlaffer M, et al. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grcstl [ C ]// FSE2009. 2009:260-276.
  • 7李倩男,李云强,蒋淑静,路遥.Keccak类非线性变换的差分性质研究[J].通信学报,2012,33(9):140-146. 被引量:7
  • 8周培德.算法设计与分析[M].北京:机械工业出版社,2004:147-150.
  • 9Maria Naya-Plasencia, Andrea Rock, Willi Meier. Practical Analysis of Reduced-Round Keccak [ C ]//INDOCRYPT. 2011 : 236-254.
  • 10Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei. Unaligned Rebound Attack: Application to Keccak [ EB/OL]. [ 2011- 01-141. http ://eprint. iacr. org/2011/420, pdf.

二级参考文献11

  • 1NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family[J]. Federal Register Notices 72, 2007, 212: 62212-62220.
  • 2ANDREW R, RAY P, CHANG S J. Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition[R]. Infor marion Technology Laboratory National Institute of Standards and Technology, Gaithersburg, 2009.
  • 3MELTEM S T, RAY P, LAWRENCE E B, et al. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competi tion. Computer Security Division[R]. Information Technology Labo-ratory National Institute of Standards-and Technology, Gaithersburg, 2011.
  • 4NIST. The SHA-3 Finalists candidates U S department of commerce national information service[EB/OL], http://csrc, nist.gov. /groups/ ST/hash/sha-3/Round3/submissions-round3. html.
  • 5GUIDO B, JOAN D, MICHAEL P, et al. Keccak sponge function family maiia document[EB/OL], http://csrc, nist.gov /groups/ ST /hash /sha-3/Roundl/submissions roundl. Html.
  • 6罗岚,叶娅兰,许春香等.在信念网模型下的SHA3前五名算法注记[EB/OL].htcp://www.scienceet.cn/upload/blog/-ile/2010/12/2010121592436256375.pdf.
  • 7GUIDO B, JOAN D, MICHAEL P, et al. A belt-and-mill hash func- tion[EB/OL], http://radiogatun.noekeon.org.
  • 8JOAN D, CLAPP C S K. Fast hashing and stream encryption with PANAMA[A]. Fast Software Encryption 1998 (S Vaudenay, ed)[C]. 1998.60-74.
  • 9JOAN D. Cipher and Hash Function Design Strategies Based on Lin- ear and Differential Cryptanalysis[D]. Belgium: Katholieke Univer- sities Leuven, 1995.
  • 10EPHRAIM A. Sharing Nonlinear Gates in the Presence of Glitches[D]. Enschede, Holland: University of Twente, 2010.

共引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部