Advanced Search
Volume 33 Issue 1
Feb.  2011
Turn off MathJax
Article Contents
Cui Ting, Jin Chen-Hui. A Construction Method of Impossible Difference for (2n,r,t)_GFNSP Overall Structure[J]. Journal of Electronics & Information Technology, 2011, 33(1): 194-198. doi: 10.3724/SP.J.1146.2009.01494
Citation: Cui Ting, Jin Chen-Hui. A Construction Method of Impossible Difference for (2n,r,t)_GFNSP Overall Structure[J]. Journal of Electronics & Information Technology, 2011, 33(1): 194-198. doi: 10.3724/SP.J.1146.2009.01494

A Construction Method of Impossible Difference for (2n,r,t)_GFNSP Overall Structure

doi: 10.3724/SP.J.1146.2009.01494
  • Received Date: 2009-11-20
  • Rev Recd Date: 2010-09-07
  • Publish Date: 2011-01-19
  • Impossible differential attack should be launched with the construction of impossible difference. This paper investigates the construction method of impossible differences for(2n,r,t)_GFNSP overall structure. A kind of (4n+1)-round impossible differences and the construct method with computation complexity O(n2r10) are presented. And this paper provides the structure of (4n+1)-round impossible differences against the DSM strategy which is proposed by Shirai et al..
  • loading
  • [1] Biham E, Biryukov A, and Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials[C]. EUROCRYPT 1999, LNCS 1592: 12-23. [2] Zhang Wen-tao, Wu Wen-ling, and Zhang Lei, et al.. Improved related-key impossible differential attacks on reduced-round AES-192[C]. Proceedings of Selected Areas in Cryptography 2006, LNCS 4356: 15-27. [3] Wu Wen-ling, Zhang Wen-tao, and Feng Deng-guo. Impossible differential cryptanalysis of reduce round ARIA and Camellia[J].Journal of Computer Science and Technology.2007, 22(3):449-456 [4] Tsunoo Y, Tsujihara E, and Shigeri M, et al.. Impossible differential cryptanalysis of CLEFIA. FSE2008, LNCS 5086: 398-411. [5] Sun Bing, Li Rui-lin, and Wang Mian, et al.. Impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report, 2008: 151. [6] Wang Wei and Wang Xiao-yun. Improved impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report, 2007: 466. [7] Wu Wen-ling, Zhang Lei, and Zhang Li-ting, et al.. Security analysis of the GF-NLFSR structure and four-cell Block Cipher[C]. ICICS 2009, LNCS 5927: 17-31. [8] Li Rui-lin, Sun Bing, and Li Chao. Distinguishing attacks on a kind of generalized unbalanced feistel network. Cryptology ePrint Archive, Report, 2009: 360. [9] Zheng Y, Matsumoto T, and Imai H. On the construction of block ciphers provably secure and not relying on any unproved hypotheses[C]. CRYPTO 1989, LNCS 435: 461-480. [10] Shirai T and Preneel B. On Feistel ciphers using optimal diffusion mappings across multiple rounds[C]. ASIACRYPT 2004, LNCS 3329: 1-15. [11] Shirai T and Shibutani K. On Feistel structures using a diffusion switching mechanism[C]. FSE 2006, LNCS 4047: 41-56. [12] Shirai T, Shibutani K, and Akishita T, et al.. The 128-bit blockcipher CLEFIA[C]. FSE 2007, LNCS 3017: 181-195.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3374) PDF downloads(611) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return