高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种基于完全性的不可能差分区分器构造方法

李俊志 关杰

李俊志, 关杰. 一种基于完全性的不可能差分区分器构造方法[J]. 电子与信息学报, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422
引用本文: 李俊志, 关杰. 一种基于完全性的不可能差分区分器构造方法[J]. 电子与信息学报, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422
LI Junzhi, GUAN Jie . A Method of Constructing Impossible Differential Distinguishers Based on Completeness[J]. Journal of Electronics & Information Technology, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422
Citation: LI Junzhi, GUAN Jie . A Method of Constructing Impossible Differential Distinguishers Based on Completeness[J]. Journal of Electronics & Information Technology, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422

一种基于完全性的不可能差分区分器构造方法

doi: 10.11999/JEIT170422
基金项目: 

国家自然科学基金(61572516, 61272041, 61272488)

A Method of Constructing Impossible Differential Distinguishers Based on Completeness

Funds: 

The National Natural Science Foundation of China (61572516, 61272041, 61272488)

  • 摘要: 基于混合运算的密码算法(MOC)以安全性高、软硬件实现效率高等特点受到人们的广泛关注。完全性指输出的每一比特都包含有输入每一比特的信息,达到完全性是密码算法设计的一个基本原则。该文提出针对MOC算法完全性分析的通用算法,并在此基础上提出利用完全性寻找MOC算法的不可能差分区分器的方法,此构造方法可直接给出MOC算法高重量的不可能差分区分器且搜索效率高,为MOC算法不可能差分区分器的实际构造提供了理论指导和技术支持。应用此方法找到了SIMON系列算法全部现有的最长不可能差分区分器,并找到了SPECK系列算法更多的不可能差分区分器。
  • WU Wenling, ZHANG Wentao, and FENG Dengguo. Impossible differential cryptanalysis of reduced-round ARIA and Camellia[J]. Journal of Computer Science and Technology, 2007, 22(3): 449-456. doi: 10.1007/s11390-007- 9056-0.
    付立仕, 金晨辉. MIBS-80的13轮不可能差分分析[J]. 电子与信息学报, 2016, 38(4): 848-855. doi: 10.11999/JEIT150673.
    FU Lishi and JIN Chenhui. Impossible differential cryptanalysis on 13-round MIBS-80[J]. Journal of Electronics Information Technology, 2016, 38(4): 848-855. doi: 10.11999/JEIT150673.
    唐学海, 李超, 王美一, 等. 3D密码的不可能差分攻击[J]. 电子与信息学报, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J. 1146.2009.01375.
    TANG Xuehai, LI Chao, WANG Meiyi, et al. Impossible differential attack on 3D cipher[J]. Journal of Electronics Information Technology, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J.1146.2009.01375.
    张凯. 基于混合运算密码模型的安全性研究[D]. [博士论文], 信息工程大学, 2016.
    ZHANG Kai. Research on the security evaluation against mixed operation based cipher model[D]. [Ph.D. dissertation], Information Engineering University, 2016.
    HONG D, SUNG J, HONG S, et al. HIGHT: A new block cipher suitable for low-resource device[C]. International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, 2006: 46-59. doi: 10.1007/11894063_4.
    BEAULIEU R, TREATMAN-CLARK S, SHORS D, et al. The SIMON and SPECK lightweight block ciphers[C]. 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), Texas, 2015: 1-6. doi: 10.1145/2744769.2747946.
    BIHAM E, BIRYUKOV A, and SHAMIR A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials [C]. International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech, 1999: 12-23. doi: 10.1007/3-540-48910-X_2.
    National Security Agency. Skipjack and KEA algorithm specifications, Version 2.0.[OL]. http: scrc.nist.gov/ Crypto Toolkit/skipjack/skipjack-kea.htm. 1998.
    BIHAM E, DUNKELMAN O, and KELLER N. Related-key impossible differential attacks on 8-round AES-192[C]. Topics in Cryptology-CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, 2006: 21-33. doi: 10.1007/11605805_2.
    CHEN J, WANG M, and PRENEEL B. Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT[C]. International Conference on Cryptology in Africa. Ifrance, Morocco, 2012: 117-137. doi: 10.1007/978-3-642-31410-0_8.
    SUN Siwei, HU Lei, WANG Peng, et al. Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers[C]. International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 2014: 158-178. doi: 10.1007 /978-3-662-45611-8_9.
    李俊志. 三类非线性反馈移存器模型的代数性质研究及应用[D]. [硕士论文], 信息工程大学, 2015.
    LI Junzhi. Algebraic properties and applications on three non-linear feedback models[D]. [Master. dissertation], Information Engineering University, 2015.
    金晨辉, 郑浩然, 张少武, 等. 密码学[M]. 北京: 高等教育出版社, 2009: 166-167.
    JIN Chenhui, ZHENG Haoran, ZHANG Shaowu, et al. Cryptography[M]. Beijing: Higher Education Press, 2009: 166-167.
  • 加载中
计量
  • 文章访问数:  1346
  • HTML全文浏览量:  216
  • PDF下载量:  145
  • 被引次数: 0
出版历程
  • 收稿日期:  2017-05-08
  • 修回日期:  2017-09-26
  • 刊出日期:  2018-02-19

目录

    /

    返回文章
    返回