期刊文献+

PRINCE密码算法代数攻击研究 被引量:1

Research on the PRINCE Algebraic Attack
原文传递
导出
摘要 PRINCE是Borgho等学者于2012年提出的低延时轻量级密码算法,轻量级密码算法的自身安全性一直是研究热点.研究PRINCE算法代数攻击安全问题,提出用Mathematica软件列出S盒的方程,将其表示为单项式个数较少的无冗余等效方程组,将PRINCE的S盒表示为由8个单项式个数均小于等于5的8元布尔方程构成的等效方程组,并基于不同的已知明文量,利用CryptoMiniSAT2.9.6软件对PRINCE进行代数攻击实验.实验结果表明,在已知明文条件下可以求出5轮PRINCE的全部密钥位,在选择明文条件下可以求出6轮PRINCE的全部密钥比特.相关研究结果可以给PRINCE密码算法的优化提供一定参考. PRINCE is a low-latency lightweight cryptographic algorithm which is proposed by the Borgho in 2012. The Security of lightweight cryptographic algorithm itself has been a hotspot issue. Algebraic attacks on PRINCE algorithm are studied. The S-box equation is constructed by Mathematica. A number of smaller monomials equivalent non-redundant equations is expressed. S-boxes of PRINCE are expressed 8 equivalent equations of 8 Boolean equations which the monomials Quantities are below or equal to 5. Experiment of Algebraic attack PRINCE is used CryptoMiniSAT2.9.6. Experimental results show that all the key bits of 5-round PRINCE can be obtained based on the differential known plaintext. All the key bits of 6-round PRINCE can be successful attacked under the chosen plaintext. Research results can provide a reference for the PRINCE optimization.
出处 《数学的实践与认识》 北大核心 2015年第5期153-159,共7页 Mathematics in Practice and Theory
基金 国家自然科学基金(61173036) 湖南省自然科学基金(2015JJ4011) 湖南省十二五重点建设学科 湖南省大学生研究性学习和创新性实验计划项目(2014366) 衡阳师范学院大学生研究性学习和创新性实验计划项目(CX1417) 聚落文化遗产数字化技术与应用湖南省重点实验室开放基金(J1401Z) 衡阳师范学院产学研基金项目(12CXYZ01) 湖南省普通高校教学改革研究项目(湘教通(2014)247号2014382)
关键词 代数攻击 CryptoMiniSAT 等效方程组 PRINCE MATHEMATICA algebraic attack CryptoMiniSAT equivalent system of equations PRINCEMathematica
  • 相关文献

参考文献3

二级参考文献37

  • 1Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: An Ultra-lightweight Block Cipher[EB/OL]. (2007-04-03). http://www. ist-ubisecsens.org/publications/present_ches2007.pdf,.
  • 2Wang Meiqin. Differential Cryptanalysis of PRESENT[EB/OL]. (2007-04-08). http://eprin t.iacr.org/2007/408.
  • 3Courtois N T, Klimov A, Patarin J. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations(EB/OL]. (2000-08-07). http://www.iacr.org/archive/ eurocrypt2000/1807/18070398-new.pdf.
  • 4Kipnis A, Shamir A. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization[C]//Proc. of Advances in Cryptology-Crypto'99. [S. l.]: Springer-Verlag, 1999: 19-30.
  • 5Faugere J C. A New Efficient Algorithm for Computing Grobner Basis(F4)[EB/OL]. (1999-05-12). http://www-spaees.lip6.frl@ papers/F99a.pdf.
  • 6Faugere J C. A New Efficient Algorithm for Computing Gr/Sbner Basis Without Reduction to Zero(FS)[EB/OL]. (2002-04-05). http://www-spaces.lip6, fr/@ papers/F02a.pdf.
  • 7Seger A J M. Algebraic Attacks from a Grfbner Basis Perspectives [EB/OL]. (2004-11-04). http://www.win.tue.nl/-henkvt/images/ReportSegers.
  • 8Bard G V, Courtois N T, Gregory C J. Efficient Methods for Conversion and Solution of Sparse Systems of Low-degree Multivariate Polynomials over GF(2) via SAT-Solvers[EB/OL]. (2007-02-04). http://eprint.iacr.org/20071024.
  • 9Cannic C.D., Dunkelamn O., KATAN and KTANTAN-A Family of Small and Efficient Hardware Oriented Block Ciphers. CHES 2009. Springer, pp. 272-288.
  • 10Bogdanov A., Knudsen L.R., Leander G., et al, PRESENT: An Ultra-Lightweight Block Ciphers. CHES 2007. Springer, pp. 450-466.

共引文献7

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部