Processing math: 100%
高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

SIMON类非线性函数的线性性质研究

关杰 卢健伟

汪巍崴, 曾云宝, 郭子华, 陈常嘉. 宽带多小区蜂窝网络中频谱功率分割机制[J]. 电子与信息学报, 2009, 31(1): 18-22. doi: 10.3724/SP.J.1146.2007.01060
引用本文: 关杰, 卢健伟. SIMON类非线性函数的线性性质研究[J]. 电子与信息学报, 2021, 43(11): 3359-3366. doi: 10.11999/JEIT200999
Wang Wei-wei, Zeng Yun-bao, Guo Zi-hua, Chen Chang-jia. Frequency Power Partition Scheme in the Broadband Multi-cell Cellular Networks[J]. Journal of Electronics & Information Technology, 2009, 31(1): 18-22. doi: 10.3724/SP.J.1146.2007.01060
Citation: Jie GUAN, Jianwei LU. Research on Linear Properties of SIMON Class Nonlinear Function[J]. Journal of Electronics & Information Technology, 2021, 43(11): 3359-3366. doi: 10.11999/JEIT200999

SIMON类非线性函数的线性性质研究

doi: 10.11999/JEIT200999
基金项目: 国家自然科学基金(61572516)
详细信息
    作者简介:

    关杰:女,1974年生,教授,博士生导师,研究方向为密码理论和密码算法分析

    卢健伟:男,1997年生,硕士生,研究方向为对称密码设计与分析

    通讯作者:

    卢健伟 lujianwei1997@163.com

  • 中图分类号: TN918.1

Research on Linear Properties of SIMON Class Nonlinear Function

Funds: The National Natural Science Foundation of China (61572516)
  • 摘要: SIMON算法是由美国国家安全局(NSA)在2013 年推出的一簇轻量级分组密码算法,具有实现代价低、安全性能好等优点,其轮函数采用了F(x)=(x<<<a)&(x<<<b)(x<<<c)类型的非线性函数。该文研究了移位参数(a,b,c)一般化时SIMON类算法轮函数的线性性质,解决了这类非线性函数的Walsh谱分布规律问题,证明了其相关优势只可能取到02k,其中kZ0k21n,并且对于特定条件下的每一个k,都存在相应的掩码对使得相关优势等于2k,给出了相关优势取到21时的充分必要条件及掩码对的计数,给出了特定条件下非平凡相关优势取到最小值时的充分必要条件与掩码对的计数。
  • 表  1  Fabc(x)相关优势计数表

    |ρ|
    011/21/41/81/161/32
    F8182482551641280825676800
    F8051482551641280825676800
    F9182207863172172815360371200
    F9051207863172172815360371200
    下载: 导出CSV

    表  2  转变成不相交2次型算法(算法1)

     输入:2次型布尔函数f(x)=f(x1,x2,,xn)
     输出:可逆矩阵M,不相交二次型ˆf(x)使得ˆf(x)=f(xM)
     (1) /*初始化*/
     (2) MI          /*In×n的可逆矩阵*/
     (3) ˆf(x)f(x1,x2,,xn)
     (4) vPickIndex(ˆf)
     (5) /*不相交化*/
     (6) 当σ(ˆf,xv)2时,执行
     (7)  mσ(ˆf,xv)   /*ˆf中包含xv的2次项个数*/
     (8)  在ˆf中找出所有的2次项xvxti满足t1<t2<<tm
     (9)  ˆfSubstitute(ˆf,It1t1,t2,,tm)
     (10)  MIt1t1,t2,,tmM
     (11)  如果σ(ˆf,xt1)2,执行
     (12)   kσ(ˆf,xt1)
     (13)   在ˆf中找出所有的2次项xt1xsi满足
          s1<s2<<sm
    下载: 导出CSV
  • [1] BEAULIEU R, SHORS D, SMITH J, et al. The SIMON and SPECK lightweight block ciphers[C]. The 52nd Annual Design Automation Conference. San Francisco, USA, 2015: 1-6.
    [2] WANG N, WANG X, JIA K, et al. Difffferential attacks on reduced SIMON versions with dynamic key-guessing techniques[J]. IACR Cryptology ePrint Archive, 2014: 2014/448.
    [3] 董向忠, 关杰. SIMON类算法轮函数的差分性质分析[J]. 密码学报, 2015, 2(3): 207–216. doi: 10.13868/j.cnki.jcr.000072

    DONG Xiangzhong, GUAN Jie. Analysis on difffferential properties of the round function of SIMON family of block ciphers[J]. Journal of Cryptologic Research, 2015, 2(3): 207–216. doi: 10.13868/j.cnki.jcr.000072
    [4] SEYED MOJTABA DEHNAVI. Further Observations on SIMON and SPECK Block Cipher Families[J]. Cryptography, 2018, 3(1): 1. doi: 10.3390/cryptography3010001
    [5] 董向忠, 关杰. SIMON类算法轮函数的线性性质[J]. 山东大学学报(理学版), 2015, 50(9): 49–54.

    DONG Xiangzhong, GUAN Jie. Linear properties of the round function of SIMON family of block ciphers[J]. 山东大学学报, 2015, 50(9): 49–54.
    [6] ABDELRAHEEM N A, ALIZADEH J, ALKHZAIMI H A, et al. Improved linear cryptanalysis of reduced-round SIMON[EB/OL]. https://eprint.iacr.org/2014/681, 2014.
    [7] CHEN H, WANG X. Improved linear hull attack on round-reduced SIMON with dynamic key-guessing techniques[C]. Fast Software Encryption—FSE 2016. Berlin, Germany, 2016: 428–449. doi: 10.1007/978-3-662-52993-5_22.
    [8] SHI Danping, HU Lei, SUN Siwei, et al. Improved linear(hull) cryptanalysis of round-reduced versions of SIMON[J]. Science China (Information Sciences) 60.03(2017): 223–225. doi: 10.1007/s11432-015-0007-1.
    [9] REHAM A and POORVI L. V linear cryptanalysis of reduced-round simon using super rounds[J]. Cryptography, 2020, 4(1): 9. doi: 10.3390/cryptography4010009
    [10] BOURA C, NAYA-PLASENCIA M, and SUDER V. Scrutinizing and improving impossible differential attacks: Applications to CLEFIA, Camellia, LBlock and Simon[C]. The 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, China, 2014: 179–199.
    [11] 陈展, 王宁. SIMON算法的不可能差分分析[J]. 密码学报, 2015, 2(6): 505–514. doi: 10.13868/j.cnki.jcr.000097

    CHEN Zhan and WANG Ning. Impossible difffferential cryptanalysis of reduced-round SIMON[J]. Journal of Cryptologic Research, 2015, 2(6): 505–514. doi: 10.13868/j.cnki.jcr.000097
    [12] KONDO K, SASAKI Y, TODO Y, et al. On the design rationale of SIMON block cipher: Integral attacks and impossible differential attacksagainst SIMON variants[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2018, 101(1): 88–98.
    [13] YU Xiaoli, WU Wenling, SHI Zhenqing, et al. Zero correlation linear cryptanalysis of reduced-round SIMON[J]. Journal of Computer Science and Technology, 2015, 30(6): 1358–1369. doi: 10.1007/s11390-015-1603-5
    [14] SUN L, FU K, and WANG M. Improved zero-correlation cryptanalysis on SIMON[C]. Information Security and Cryptology—INSCRYPT 2015. Beijing, China, 2015: 125–143.
    [15] ZHANG Kai, Guanjie, HU Bin, et al. Security evaluation on Simeck against zero-correlation linear cryptanalysis[C]. IET Information Security, 2018, 12(1): 87–93. doi: 10.1049/iet-ifs.2016.0503.
    [16] FU Kai, SUN Ling, and WANG Meiqin. New integral attacks on SIMON[J]. IET Information Security, 2017, 11(5): 277–286. doi: 10.1049/iet-ifs.2016.0241
    [17] CHU Zhihui, CHEN Huaifeng, WANG Xiaoyun, et al. Improved integral attacks on SIMON32 and SIMON48 with dynamic key-guessing techniques[J]. Security and Communication Networks, 2018: 5160237. doi: 10.1155/2018/5160237
    [18] YANG G, ZHU B, SUDER V, et al. The Simeck Family of Lightweight Block Ciphers[C]. Güneysu T, Handschuh H. (eds) Cryptographic Hardware and Embedded Systems, CHES 2015. Lecture Notes in Computer Science, vol 9293. Springer, Berlin, Germany, https://doi.org/10.1007/978-3-662-48324-4_16.
    [19] SHI D, SUN S, SASAKI Y, et al. Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS[M]. Advances in Cryptology–CRYPTO, 2019.
    [20] 鞠桂枝, 赵亚群. 多输出部分Bent函数若干性质的研究[J]. 工程数学学报, 2005(6): 183–186.
  • 加载中
表(2)
计量
  • 文章访问数:  892
  • HTML全文浏览量:  404
  • PDF下载量:  74
  • 被引次数: 0
出版历程
  • 收稿日期:  2020-11-25
  • 修回日期:  2021-03-30
  • 网络出版日期:  2021-05-06
  • 刊出日期:  2021-11-23

目录

    /

    返回文章
    返回