高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

AES-128 Biclique结构的分布特征

李云强 张小勇 王爱兰

李云强, 张小勇, 王爱兰. AES-128 Biclique结构的分布特征[J]. 电子与信息学报, 2016, 38(1): 135-140. doi: 10.11999/JEIT150597
引用本文: 李云强, 张小勇, 王爱兰. AES-128 Biclique结构的分布特征[J]. 电子与信息学报, 2016, 38(1): 135-140. doi: 10.11999/JEIT150597
LI Yunqiang, ZHANG Xiaoyong, WANG Ailan. Distribution Characteristics of the AES-128 Biclique Structure[J]. Journal of Electronics & Information Technology, 2016, 38(1): 135-140. doi: 10.11999/JEIT150597
Citation: LI Yunqiang, ZHANG Xiaoyong, WANG Ailan. Distribution Characteristics of the AES-128 Biclique Structure[J]. Journal of Electronics & Information Technology, 2016, 38(1): 135-140. doi: 10.11999/JEIT150597

AES-128 Biclique结构的分布特征

doi: 10.11999/JEIT150597
基金项目: 

国家863计划(2011AA7011016)

Distribution Characteristics of the AES-128 Biclique Structure

Funds: 

The National 863 Program of China (2011AA 7011016)

  • 摘要: Biclique攻击是目前唯一能将对AES全轮攻击降至穷举攻击之下的密钥恢复攻击,但如何得到AES新的Biclique结构或全部Biclique结构尚没有解决。该文设计了寻找AES-128全部Biclique结构的算法以及衡量基于相应结构Biclique攻击的数据和时间复杂度的算法,得出了AES-128共有215类i-差分能产生555个Biclique结构,给出了数据复杂度最小和次小的i-差分路径,分别列出了计算复杂度最小和数据复杂度最小的Biclique差分及匹配。
  • DAEMEN J and RIJMEN V. The design of Rijndael: AES- the advanced encryption standard[S]. Springer-Verlag, 2002.
    NIELS F, JOHN K, STEFAN L, et al. Improved cryptanalysis of Rijndael[J]. LNCS, 2000, 1978: 213-230.
    HENRI G and MARINE M. A collision attack on 7 rounds of Rijndael[C]. Third AES Candidate Conference, New York, USA, 2000: 230-241.
    HAMID M, MOHAMMAD D, RIJMEN V, et al. Improved impossible differential cryptanalysis of 7-round AES-128[J]. LNCS, 2010, 6498: 282291.
    DUNKELMAN O, KELLER N, and SHAMIR A. Improved single-key attacks on 8-round AES-192 and AES-256[J]. LNCS, 2010, 6477: 158-176.
    DMITRY K, CHRISTIAN R, and ALEXANDRA S. Bicliques for preimages: attacks on Skein-512 and the SHA-2 family[C]. 19th International Workshop on Fast Software Encryption, Washington DC, USA, 2012: 244-263.
    WANG Yanfeng, WU Wenling, and YU Xiaoli. Biclique cryptanalysis of reduced-round piccolo block cipher[J]. LNCS, 2012, 7232: 337-352.
    ANDREY B, DMITRY K, and CHRISTIAN R. Biclique cryptanalysis of the full AES[C]. ASIACRYPT11, Seoul, Korea, 2011: 344-371.
    徐田敏. 分组密码AES和ARIA算法的Biclique分析[D]. [硕士论文], 信息工程大学, 2013.
    XU Tianmin. Biclique cryptanalysis of AES and ARIA block cipher[D]. [Master dissertation]. Information Engineering University, 2013.
    谢作敏, 陈少真, 鲁林真. 11轮3D密码的不可能差分攻击[J]. 电子与信息学报, 2014, 36(5): 1215-1220. doi: 10.3724/SP.J. 1146.2013.00948.
    XIE Zuomin, CHEN Shaozhen, and LU Linzhen. Impossible differential cryptanalysis of 11-round 3D cipher[J]. Journal of Electronics Information Technology, 2014, 36(5): 1215-1220. doi: 10.3724/SP.J.1146.2013.00948.
    罗伟, 郭建胜. Eagle-128算法的相关密钥-矩形攻击[J]. 电子与信息学报, 2014, 36(6): 1520-1524. doi: 10.3724/SP.J. 1146.2013.01239.
    LUO Wei and GUO Jiansheng. Related-key rectangle attack on Eagle-128 algorithm[J]. Journal of Electronics Information Technology, 2014, 36(6): 1520-1524. doi: 10.3724 /SP.J.1146.2013.01239.
    沈璇, 李瑞林, 李超, 等. SHACAL-2算法中非线性函数的差分特性及其应用[J]. 电子与信息学报, 2014, 36(7): 1661-1666. doi: 10.3724/SP.J. 1146.2013.01717.
    SHEN Xuan, LI Ruilin, LI Chao, et al. Differential analysis of the nonlinear functions of SHACAL-2 algorithm and the application[J]. Journal of Electronics Information Technology, 2014, 36(7): 1661-1666. doi: 10.3724/SP.J.1146. 2013.01717.
    郭瑞, 金晨辉. 低轮FOX64算法的零相关-积分分析[J]. 电子与信息学报, 2015, 37(2): 417-422. doi: 10.11999/ JEIT140373.
    GUO Rui and JIN Chenhui. Integral cryptanalysis of reduced round FOX64[J]. Journal of Electronics Information Technology, 2015, 37(2): 417-422. doi: 10.11999/ JEIT140373.
  • 加载中
计量
  • 文章访问数:  1202
  • HTML全文浏览量:  102
  • PDF下载量:  949
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-05-18
  • 修回日期:  2015-09-01
  • 刊出日期:  2016-01-19

目录

    /

    返回文章
    返回