Advanced Search
Volume 43 Issue 5
May  2021
Turn off MathJax
Article Contents
Xiaoni DU, Ee DUAN, Tianxin WANG. Security Analysis of Block Cipher CFE[J]. Journal of Electronics & Information Technology, 2021, 43(5): 1365-1371. doi: 10.11999/JEIT200057
Citation: Xiaoni DU, Ee DUAN, Tianxin WANG. Security Analysis of Block Cipher CFE[J]. Journal of Electronics & Information Technology, 2021, 43(5): 1365-1371. doi: 10.11999/JEIT200057

Security Analysis of Block Cipher CFE

doi: 10.11999/JEIT200057
Funds:  The National Natural Science Foundation of China (61772022)
  • Received Date: 2020-01-14
  • Rev Recd Date: 2020-11-23
  • Available Online: 2020-12-03
  • Publish Date: 2021-05-18
  • The security of high security and high speed block cipher algorithm of two-module FEistel structure based on Chaos (CFE) is analyzed. The results show that the cipher is not suitable to use integral attack, meat-in-the-middle attack, invariant attack, interpolation attack and circle shift attack to analyze its security. And it can resist the related-key attack. Furthermore, 5 rounds of impossible differential characteristic are constructed and used to distinguish attacks. The lower bound of the active S-box is 6, and the probability is about 2–21. There are 5 rounds of linear characteristic with zero-correlation.
  • loading
  • [1]
    BIHAM E and SHAMIR A. Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991, 4(1): 3–72. doi: 10.1007/BF00630563
    [2]
    杨伟伟, 刘光杰, 戴跃伟. 基于交叉耦合映像格子时空混沌的S盒设计[J]. 应用科学学报, 2015, 33(4): 438–448. doi: 10.3969/j.issn.0255-8297.2015.04.010

    YANG Weiwei, LIU Guangjie, and DAI Yuewei. Design of S-boxes based on spatiotemporal chaotic systems of cross coupled map lattices[J]. Journal of Applied Sciences—Electronics and Information Engineering, 2015, 33(4): 438–448. doi: 10.3969/j.issn.0255-8297.2015.04.010
    [3]
    贾平, 徐洪, 戚文峰. 轻量S盒密码性质研究[J]. 密码学报, 2015, 2(6): 497–504. doi: 10.13868/j.cnki.jcr.000096

    JIA Ping, XU Hong, and QI Wenfeng. Research on cryptographic properties of lightweight S-boxes[J]. Journal of Cryptologic Research, 2015, 2(6): 497–504. doi: 10.13868/j.cnki.jcr.000096
    [4]
    杨萍. 基于MILP方法的轻量级分组密码的安全性分析[D]. [硕士论文], 山东师范大学, 2018.

    YANG Ping. Security analysis of lightweight block cipher based on MILP method[D]. [Master dissertation], Shandong Normal University, 2018.
    [5]
    吴文玲, 张蕾. 不可能差分密码分析研究进展[J]. 系统科学与数学, 2008, 28(8): 971–983.

    WU Wenling and ZHANG Lei. The state-of-the-art of research on impossible differential cryptanalysis[J]. Journal of Systems Science and Mathematical Sciences, 2008, 28(8): 971–983.
    [6]
    韦永壮, 史佳利, 李灵琛. LiCi分组密码算法的不可能差分分析[J]. 电子与信息学报, 2019, 41(7): 1610–1617. doi: 10.11999/JEIT180729

    WEI Yongzhuang, SHI Jiali, and LI Lingchen. Impossible differential cryptanalysis of LiCi block cipher[J]. Journal of Electronics &Information Technology, 2019, 41(7): 1610–1617. doi: 10.11999/JEIT180729
    [7]
    张仕伟, 陈少真. SIMON不可能差分及零相关路径自动化搜索算法[J]. 软件学报, 2018, 29(11): 3544–3553. doi: 10.13328/j.cnki.jos.005296

    ZHANG Shiwei and CHEN Shaozhen. Automatic search algorithm for impossible differential trials and zero-correlation linear trials in SIMON[J]. Journal of Software, 2018, 29(11): 3544–3553. doi: 10.13328/j.cnki.jos.005296
    [8]
    马楚焱, 刘国强, 李超. 对PICO和RECTANGLE的零相关线性分析[J]. 密码学报, 2017, 4(5): 413–422. doi: 10.13868/j.cnki.jcr.000193

    MA Chuyan, LIU Guoqiang, and LI Chao. Zero-correlation linear cryptanalysis on PICO and RECTANGLE[J]. Journal of Cryptologic Research, 2017, 4(5): 413–422. doi: 10.13868/j.cnki.jcr.000193
    [9]
    DUO Lei, LI Chao, and FENG Keqin. Square like attack on camellia[C]. The International Conference on Information and Communications Security, Zhengzhou, China, 2007: 269–283. doi: 10.1007/978-3-540-77048-0_21.
    [10]
    任炯炯, 李航, 陈少真. 减轮Simeck算法的积分攻击[J]. 电子与信息学报, 2019, 41(9): 2156–2163. doi: 10.11999/JEIT180849

    REN Jiongjiong, LI Hang, and CHEN Shaozhen. Integral attack on reduced-round simeck algorithm[J]. Journal of Electronics &Information Technology, 2019, 41(9): 2156–2163. doi: 10.11999/JEIT180849
    [11]
    邓元豪, 金晨辉, 赵杰卿. Type-3型广义Feistel结构的中间相遇攻击[J]. 密码学报, 2019, 6(1): 27–36. doi: 10.13868/j.cnki.jcr.000280

    DENG Yuanhao, JIN Chenhui, and ZHAO Jieqing. Meet-in-the-middle attack on Type-3 Feistel structure[J]. Journal of Cryptologic Research, 2019, 6(1): 27–36. doi: 10.13868/j.cnki.jcr.000280
    [12]
    汪艳凤, 吴文玲. 分组密码TWINE的中间相遇攻击[J]. 软件学报, 2015, 26(10): 2684–2695. doi: 10.13328/j.cnki.jos.004805

    WANG Yanfeng and WU Wenling. Meet-in-the-Middle attack on TWINE block cipher[J]. Journal of Software, 2015, 26(10): 2684–2695. doi: 10.13328/j.cnki.jos.004805
    [13]
    JAKOBSEN T and KNUDSEN L R. The interpolation attack on block ciphers[C]. The International Workshop on Fast Software Encryption, Haifa, Israel, 1997: 28–40. doi: 10.1007/BFb0052332.
    [14]
    金晨辉, 杨阳, 祁传达. 对混沌序列密码的相关密钥攻击[J]. 电子与信息学报, 2006, 28(3): 410–414.

    JIN Chenhui, YANG Yang, and QI Chuanda. A related-key attack on chaotic stream ciphers[J]. Journal of Electronics &Information Technology, 2006, 28(3): 410–414.
    [15]
    TODO Y, LEANDER G, and SASAKI Y. Nonlinear invariant attack: Practical attack on full SCREAM, iSCREAM, and Midori64[J]. Journal of Cryptology, 2019, 32(4): 1383–1422. doi: 10.1007/s00145-018-9285-0
    [16]
    XIE E Y, LI Chengqing YU Simin, et al. On the cryptanalysis of Fridrich’s chaotic image encryption scheme[J]. Signal Processing, 2017, 132: 150–154. doi: 10.1016/j.sigpro.2016.10.002
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(1)

    Article Metrics

    Article views (1197) PDF downloads(79) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return