高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Feistel-SPS结构的反弹攻击

董乐 邹剑 吴文玲 杜蛟

董乐, 邹剑, 吴文玲, 杜蛟. Feistel-SPS结构的反弹攻击[J]. 电子与信息学报, 2016, 38(8): 1928-1934. doi: 10.11999/JEIT151255
引用本文: 董乐, 邹剑, 吴文玲, 杜蛟. Feistel-SPS结构的反弹攻击[J]. 电子与信息学报, 2016, 38(8): 1928-1934. doi: 10.11999/JEIT151255
DONG Le, ZOU Jian, WU Wenling, DU Jiao. Rebound Attack on the Feistel-SPS Structure[J]. Journal of Electronics & Information Technology, 2016, 38(8): 1928-1934. doi: 10.11999/JEIT151255
Citation: DONG Le, ZOU Jian, WU Wenling, DU Jiao. Rebound Attack on the Feistel-SPS Structure[J]. Journal of Electronics & Information Technology, 2016, 38(8): 1928-1934. doi: 10.11999/JEIT151255

Feistel-SPS结构的反弹攻击

doi: 10.11999/JEIT151255
基金项目: 

国家自然科学基金(61402154, U1404601, 11471104, 11171093),河南省高校科技创新团队支持计划(14IRTSTHN023)

Rebound Attack on the Feistel-SPS Structure

Funds: 

National Natural Science Foundation of China (61402154, U1404601, 11471104, 11171093), Program for Innovative Research Team (in Science and Technology) in University of Henan Province (14IRTSTHN023)

  • 摘要: 该文给出了以Feistel结构为主框架,以SPS(Substitution-Permutation-Substitution)函数作为轮函数的Feistel-SPS结构的反弹攻击。通过对差分扩散性质的研究,得到这一结构的6轮已知密钥截断差分区分器,并在此区分器的基础上,给出将这一结构内嵌入MMO(Matyas-Meyer-Oseas)和MP(Miyaguchi-Preneel)模式所得到的压缩函数的近似碰撞攻击。此外,还将6轮截断差分区分器扩展,得到了7轮的截断差分路径,基于此还得到上述两种模式下压缩函数的7轮截断差分区分器。
  • U.S. Department of Commerce and National Institute of Standards and Technology. FIPS PUB 46-3[S]. 1999.
    WU Wenling and ZHANG Lei. LBlock: a lightweight block cipher[C]. 9th International Conference on Applied Cryptography and Network Security-ACNS 2011, Nerja, Spain, 2011: 327-344. doi: 10.1007/978-3-642-21554-4_19.
    BOGDANOV A and SHIBUTANI K. Double SP-functions: enhanced generalized Feistel networks[C]. 16th Australasian Conference on Information Security and Privacy-ACISP 2011, Melbourne, Australia, 2011: 106-119. doi: 10.1007/978-3-642- 22497-3_8.
    SHIBUTANI K, ISOBE T, HIWATARI H, et al. Piccolo: an ultra-lightweight blockcipher[C]. 13th International Workshop on Cryptographic Hardware and Embedded Systems-CHES 2011, Nara, Japan, 2011: 342-357. doi: 10.1007/978-3-642-23951-9_23.
    KNUDSEN L R and RIJMEN V. Known-key distinguishers for some block ciphers[C]. 13th International Conference on the Theory and Application of Cryptology and Information Security-ASIACRYPT 2007, Kuching, Malaysia, 2007: 315-324. doi: 10.1007/978-3-540-76900-2_19.
    BLONDEAU C, PEYRIN T, and WANG L. Known-key distinguisher on full PRESENT[C]. 35th Annual Cryptology Conference on Advances in Cryptology-CRYPTO 2015, Santa Barbara, USA, 2015: 455-474. doi: 10.1007/978-3-662- 47989-6_22.
    ANDREEVA E, BOGDANOV A, and MENNINK B. Towards understanding the known-key security of block ciphers[C]. 20th International Workshop on Fast Software Encryption-FSE 2013, Singapore, 2013: 348-366. doi: 10.1007 /978-3-662-43933-3_18.
    ZHA Daren, WU Shuang, and WANG Qiongxiao. Improved known-key distinguisher on round-reduced 3D block cipher[J]. Chinese Journal of Electronics, 2015, 24(1): 199-204. doi: 10.1049/cje.2015.01.033.
    AOKI K. A property for full CLEFIA-128 detected by a middletext distinguisher under the known-key setting[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2014, 97(1): 292-297. doi: 10.1587/transfun.E97.A.292.
    SASAKI Y and YASUDA K. Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes[C]. 18th International Workshop on Fast Software Encryption- FSE 2011, Lyngby, Denmark, 2011: 397-415. doi: 10.1007/ 978-3-642-21702-9_23.
    HYUNGCHUL K, DEUKJO H, DUKJAE M, et al. Known-key attacks on generalized Feistel schemes with SP round function[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012, 95(9): 1550-1560. doi: 10.1587/transfun.E95.A.1550.
    DONG Le, WU Wenling, WU Shuang, et al. Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes[J]. Frontiers of Computer Science, 2014, 8(3): 513-525. doi: 10.1007/s11704-014-2412-7.
    DONG Le, WANG Yanling, WU Wenling, et al. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitutionpermutation functions and near-collision attacks on its hashing modes[J]. IET Information Security, 2015, 9(5): 277-283. doi: 10.1049/ iet-ifs.2014.0402.
    SASAKI Y. Double-sp is weaker than single-sp: rebound attacks on Feistel ciphers with several rounds[C]. 13th International Conference on Progress in Cryptology- INDOCRYPT 2012, Kolkata, India, 2012: 265-282. doi: 10.1007/978-3-642-34931-7_16.
    MENDEL F, RECHBERGER C, SCHLFFER M, et al. The rebound attack: cryptanalysis of reduced Whirlpool and Grstl[C]. 16th International Workshop on Fast Software Encryption-FSE 2009, Leuven, Belgium, 2009: 260-276. doi: 10.1007/978-3-642-03317-9_16.
    SASAKI Y, LI Y, WANG L, et al. Non-full-active Super-Sbox analysis: applications to ECHO and Grstl[C]. 16th International Conference on Advances in Cryptology- ASIACRYPT 2010, Singapore, 2010: 38-55. doi: 10.1007/ 978-3-642-17373-8_3.
  • 加载中
计量
  • 文章访问数:  1276
  • HTML全文浏览量:  141
  • PDF下载量:  455
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-11-09
  • 修回日期:  2016-04-08
  • 刊出日期:  2016-08-19

目录

    /

    返回文章
    返回