期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers 被引量:5
1
作者 Kai Zhang Jie Guan Bin Hu 《China Communications》 SCIE CSCD 2018年第2期54-66,共13页
In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible... In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible differential cryptanalysis and zero-correlation linear cryptanalysis are among the most powerful attacks, and the key problems for these two attacks are discovering more and longer impossible differentials(IDs) and zero-correlation linear hulls(ZCLHs). However, finding new IDs and ZCLHs for ARX ciphers has been a manual work for a long time, which has been an obstacle in improving these two attacks. This paper proposes an automatic search method to improve the efficiency of finding new IDs and ZCLHs for ARX ciphers. In order to prove the efficiency of this new tool, we take HIGHT, LEA, SPECK three typical ARX algorithms as examples to explore their longer and new impossible differentials and zero-correlation linear hulls. To the best of our knowledge, this is the first application of automatic search method for ARX ciphers on finding new IDs and ZCLHs. For HIGHT, we find more 17 round IDs and multiple 17 round ZCLHs. This is the first discovery of 17 round ZCLHs for HIGHT. For LEA, we find extra four 10 round IDs and several 9 round ZCLHs. In the specification of LEA, the designers just identified three 10 round IDs and one 7round ZCLH. For SPECK, we find thousands of 6 round IDs and forty-four 6 round ZCLHs. Neither IDs nor ZCLHs of SPECK has been proposed before. The successful application of our new tool shows great potential in improving the impossible differential cryptanalysis and zero-correlation linear cryptanalysis on ARX ciphers.. 展开更多
关键词 automatic search tool impossibledifferential cryptanalysis zero-correlation lin-ear cryptanalysis ARX ciphers modes opera-tion
在线阅读 下载PDF
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON 被引量:4
2
作者 于晓丽 吴文玲 +3 位作者 石振青 张建 张蕾 汪艳凤 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第6期1358-1369,共12页
In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software ... In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software platforms. In this paper, we mainly present zero-correlation linear cryptanalysis on various versions of SIMON. Firstly, by using miss- in-the-middle approach, we construct zero-correlation linear distinguishers of SIMON, and zero-correlation linear attacks are presented based oi1 careful analysis of key recovery phase. Secondly, multidimensional zero-correlation linear attacks are used to reduce the data complexity. Our zero-correlation linear attacks perform better than impossible differential attacks proposed by Abed et al. in ePrint Report 2013/568. Finally, we also use the divide-and-conquer technique to improve the results of linear cryptanalysis proposed by Javad et al. in ePrint Report 2013/663. 展开更多
关键词 lightweight block cipher SIMON linear cryptanalysis zero-correlation dual property
原文传递
Interference-Free Pilot Design and Channel Estimation Using ZCZ Sequences for MIMO-OFDM-Based C-V2X Communications 被引量:5
3
作者 Haibin Chen Rongqing Zhang +2 位作者 Wenjun Zhai Xiaoli Liang Guojuan Song 《China Communications》 SCIE CSCD 2018年第7期47-54,共8页
Cellular vehicle-to-everything(C-V2X) communications is regarded as a promising and feasible solution for 5G-enabled vehicular communications and networking. In this paper, we investigate the pilot design and channel ... Cellular vehicle-to-everything(C-V2X) communications is regarded as a promising and feasible solution for 5G-enabled vehicular communications and networking. In this paper, we investigate the pilot design and channel estimation problem in MIMO-OFDM-based C-V2X systems with severe co-channel interference due to spectrum reusing among different V2X communication links. By using zero-correlation zone(ZCZ) sequences, we provide an interference-free pilot design scheme and a corresponding time-domain(TD) correlation-based channel estimation(TD-CCE) method. We employ the ZCZ sequences from the same family set to be designed as the TD pilot symbols and guarantee the pilot sequeneces for neighboring V2X communication links are code-division multiplexing(CDM). The co-channel pilot interference of the deisgned pilot symbols can be effectively eliminated by exploiting the provided TD-CCE method. Simulation results indicate that the accuracy of channel estimation can be effectively improved by the proposed scheme, whose performance is close to that of the non-interference situation. 展开更多
关键词 C-V2X MIMO-OFDM zero-correlation zone sequences pilot design channel estimation
在线阅读 下载PDF
Zodiac密码算法的多维零相关线性分析
4
作者 程璐 魏悦川 +1 位作者 潘晓中 李安辉 《计算机应用》 CSCD 北大核心 2017年第6期1605-1608,1624,共5页
分组密码算法Zodiac支持3种密钥长度,分别为Zodiac-128、Zodiac-192、Zodiac-256。利用零相关线性分析方法评估了Zodiac算法的安全性,首先根据算法的结构特性,构造了一些关于Zodiac算法的10轮零相关线性逼近,然后对16轮Zodiac-192进行... 分组密码算法Zodiac支持3种密钥长度,分别为Zodiac-128、Zodiac-192、Zodiac-256。利用零相关线性分析方法评估了Zodiac算法的安全性,首先根据算法的结构特性,构造了一些关于Zodiac算法的10轮零相关线性逼近,然后对16轮Zodiac-192进行了多维零相关分析。分析结果显示:攻击过程中一共恢复了19个字节的密钥,其数据复杂度约为2^(124.40)个明密文对,计算复杂度为2^(181.58)次16轮加密。由此可得:16轮(即全轮)192 bit密钥的Zodiac算法(Zodiac-192)对于零相关线性分析方法是不安全的。 展开更多
关键词 分组密码 Zodiac密码算法 线性掩码 线性逼近 零相关线性分析
在线阅读 下载PDF
Zero-correlation linear attack on reduced-round SKINNY
5
作者 Yi ZHANG Ting CUI Congjun WANG 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第4期193-205,共13页
At ToSC 2019,Ankele et al.proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model.This paper further clarifies this principle and gives a search model for zero-correlat... At ToSC 2019,Ankele et al.proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model.This paper further clarifies this principle and gives a search model for zero-correlation distin-guishers.As a result,for the first time,the authors construct 14-round and 16-round zero-correlation linear distinguishers for SKINNY-n-2n and SKINNY-n-3n,respectively,which are both two rounds longer than Anekele et al.'s.Based on these distinguishers,the paper presents related-tweakey zero-correlation linear attacks on 21-round SKINNY-n-2n and 25-round SKINNY-n-3n,respectively. 展开更多
关键词 tweakable block cipher zero-correlation related-tweakey SKINNY
原文传递
演化密码对抗多重线性密码分析能力的研究 被引量:2
6
作者 张焕国 李春雷 唐明 《中国科学:信息科学》 CSCD 2012年第5期603-616,共14页
演化密码是我国学者提出的一种新型密码.文中对演化密码对抗多重线性密码分析的能力进行研究,研究表明演化密码对抗多重线性攻击方面的能力高于普通固定算法密码.文中介绍了基于对数似然比(LLR)统计方法的两种多重线性密码分析方法,这... 演化密码是我国学者提出的一种新型密码.文中对演化密码对抗多重线性密码分析的能力进行研究,研究表明演化密码对抗多重线性攻击方面的能力高于普通固定算法密码.文中介绍了基于对数似然比(LLR)统计方法的两种多重线性密码分析方法,这两种方法利用多个线性逼近式分别扩展了Matsui最初提出的线性攻击算法1和算法2.在考察这两种算法的数据复杂度N、比特优势a,以及预期成功率PS三者关系的基础上,证明了在比特优势和预期成功率相同的条件下,攻击演化密码的数据复杂度大于攻击固定算法密码的数据复杂度,并论述了在数据复杂度N相同的情况下,攻击演化密码的时间复杂度和空间复杂度都明显高于攻击固定算法密码的情形.这表明演化密码在对抗多重线性攻击方面的安全性高于固定算法密码. 展开更多
关键词 信息安全 密码学 演化密码 密码分析 多重线性密码分析
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部