Advanced Search
Volume 40 Issue 2
Feb.  2018
Turn off MathJax
Article Contents
LI Junzhi, GUAN Jie . A Method of Constructing Impossible Differential Distinguishers Based on Completeness[J]. Journal of Electronics & Information Technology, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422
Citation: LI Junzhi, GUAN Jie . A Method of Constructing Impossible Differential Distinguishers Based on Completeness[J]. Journal of Electronics & Information Technology, 2018, 40(2): 430-437. doi: 10.11999/JEIT170422

A Method of Constructing Impossible Differential Distinguishers Based on Completeness

doi: 10.11999/JEIT170422
Funds:

The National Natural Science Foundation of China (61572516, 61272041, 61272488)

  • Received Date: 2017-05-08
  • Rev Recd Date: 2017-09-26
  • Publish Date: 2018-02-19
  • Mixed Operation based Ciphers (MOC) attract cryptographers owing to their high security and high efficiency on both software and hardware platforms. As a basic principle of cryptosystem design, completeness refers to that every output bit contains the information of every input bit. This paper presents a universal algorithm of completeness analysis against MOC. Based on the algorithm, a method of constructing impossible differential distinguishers utilizing completeness is proposed. This method constructs heavy weight impossible differential distinguishers directly with high efficiency. The method can provide theory and technology direction for the construction of impossible differential distinguishers. Then, this paper analysis SIMON and SPECK with this method and introduces all the longest impossible differential distinguishers of SIMON currently public and new impossible differential distinguishers of SPECK.
  • loading
  • WU Wenling, ZHANG Wentao, and FENG Dengguo. Impossible differential cryptanalysis of reduced-round ARIA and Camellia[J]. Journal of Computer Science and Technology, 2007, 22(3): 449-456. doi: 10.1007/s11390-007- 9056-0.
    付立仕, 金晨辉. MIBS-80的13轮不可能差分分析[J]. 电子与信息学报, 2016, 38(4): 848-855. doi: 10.11999/JEIT150673.
    FU Lishi and JIN Chenhui. Impossible differential cryptanalysis on 13-round MIBS-80[J]. Journal of Electronics Information Technology, 2016, 38(4): 848-855. doi: 10.11999/JEIT150673.
    唐学海, 李超, 王美一, 等. 3D密码的不可能差分攻击[J]. 电子与信息学报, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J. 1146.2009.01375.
    TANG Xuehai, LI Chao, WANG Meiyi, et al. Impossible differential attack on 3D cipher[J]. Journal of Electronics Information Technology, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J.1146.2009.01375.
    张凯. 基于混合运算密码模型的安全性研究[D]. [博士论文], 信息工程大学, 2016.
    ZHANG Kai. Research on the security evaluation against mixed operation based cipher model[D]. [Ph.D. dissertation], Information Engineering University, 2016.
    HONG D, SUNG J, HONG S, et al. HIGHT: A new block cipher suitable for low-resource device[C]. International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, 2006: 46-59. doi: 10.1007/11894063_4.
    BEAULIEU R, TREATMAN-CLARK S, SHORS D, et al. The SIMON and SPECK lightweight block ciphers[C]. 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), Texas, 2015: 1-6. doi: 10.1145/2744769.2747946.
    BIHAM E, BIRYUKOV A, and SHAMIR A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials [C]. International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech, 1999: 12-23. doi: 10.1007/3-540-48910-X_2.
    National Security Agency. Skipjack and KEA algorithm specifications, Version 2.0.[OL]. http: scrc.nist.gov/ Crypto Toolkit/skipjack/skipjack-kea.htm. 1998.
    BIHAM E, DUNKELMAN O, and KELLER N. Related-key impossible differential attacks on 8-round AES-192[C]. Topics in Cryptology-CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, 2006: 21-33. doi: 10.1007/11605805_2.
    CHEN J, WANG M, and PRENEEL B. Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT[C]. International Conference on Cryptology in Africa. Ifrance, Morocco, 2012: 117-137. doi: 10.1007/978-3-642-31410-0_8.
    SUN Siwei, HU Lei, WANG Peng, et al. Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers[C]. International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 2014: 158-178. doi: 10.1007 /978-3-662-45611-8_9.
    李俊志. 三类非线性反馈移存器模型的代数性质研究及应用[D]. [硕士论文], 信息工程大学, 2015.
    LI Junzhi. Algebraic properties and applications on three non-linear feedback models[D]. [Master. dissertation], Information Engineering University, 2015.
    金晨辉, 郑浩然, 张少武, 等. 密码学[M]. 北京: 高等教育出版社, 2009: 166-167.
    JIN Chenhui, ZHENG Haoran, ZHANG Shaowu, et al. Cryptography[M]. Beijing: Higher Education Press, 2009: 166-167.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1318) PDF downloads(145) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return