期刊文献+

11轮3D分组密码算法的中间相遇攻击

Meet-in-the-middle attack on 11-round reduced 3D block cipher
下载PDF
导出
摘要 针对3D分组密码算法的安全性分析,对该算法抵抗中间相遇攻击的能力进行了评估。基于3D算法的基本结构及S盒的差分性质,减少了在构造多重集时所需的猜测字节数,从而构建了新的6轮3D算法中间相遇区分器。然后,将区分器向前扩展2轮,向后扩展3轮,得到11轮3D算法中间相遇攻击。实验结果表明:构建区分器时所需猜测的字节数为42 B,攻击时所需的数据复杂度约为2497个选择明文,时间复杂度约为2325.3次11轮3D算法加密,存储复杂度约为2342B。新攻击表明11轮3D算法对中间相遇攻击是不免疫的。 Focusing on the safety analysis of the 3D block cipher, a new method on this algorithm against the meet-in- the-middle attack was proposed. Based on the structure of the 3D algorithm and the differential properties of the S-box, the research reduced the number of required bytes during structuring the multiple sets in this attack and constructed a new 6-round meet-in-the-middle distinguisher. According to extending the distinguisher 2-round forward and 3-round backward, an 1 1- round meet-in-the-middle attack of the 3D algorithm was finally achieved. The experimental results show that: the number of required bytes on constructed the distinguisher is 42, the attack requires a data complexity of about 2497 chosen plaintexts, a time complexity of about 2^325. 3 1 1-round 3 D algorithm eneryption and a memory complexity of about 2^342 bytes. The new attack shows that the 1 1-round of the 3D algorithm is not immune to the meet-in-the-middle attack.
出处 《计算机应用》 CSCD 北大核心 2015年第3期700-703,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61100185)
关键词 分组密码 3D算法 中间相遇攻击 S盒 区分器 block cipher 3D algorithm meet-in-the-middle attack S-box distinguisher
  • 相关文献

参考文献13

  • 1NAKAHARA J J. 3D: a three-dimensional block cipher[M]//FRANKLIN M K, HUI L C K, WONG D S. Cryptology and Network Security,LNCS 5339. Berlin: Springer, 2008:252-267. 被引量:1
  • 2DAEMEN J, RIJMEN V. Rijndael/AES[M]//van TILBORG H C A. Encyclopedia of Cryptography and Security. Berlin: Springer, 2005:520-524. 被引量:1
  • 3唐学海,李超,王美一,屈龙江.3D密码的不可能差分攻击[J].电子与信息学报,2010,32(10):2516-2520. 被引量:11
  • 4王美一,唐学海,李超,屈龙江.3D密码的Square攻击[J].电子与信息学报,2010,32(1):157-161. 被引量:14
  • 5DONG L, WU W, WU S, et al. Known-key distinguisher on round-reduced 3D block cipher[M]//JUNG S, YUNG M. Information Security Applications, LNCS 7115. Berlin: Springer, 2012:55-69. 被引量:1
  • 6苏崇茂,韦永壮,马春波.10轮3D分组密码算法的中间相遇攻击[J].电子与信息学报,2012,34(3):694-697. 被引量:12
  • 7KOYAMA T, WANG L, SASAKI Y, et al. New truncated differential cryptanalysis on 3D block cipher[M]//RYAN M D, SMYTH B, WANG G. Information Security Practice and Experience, LNCS 7232. Berlin: Springer, 2012:109-125. 被引量:1
  • 8李曼曼,陈少真.改进的10轮3D密码算法的中间相遇攻击[J].信息工程大学学报,2013,14(3):257-262. 被引量:3
  • 9BARRETO P, RIJMEN V. The anubis block cipher[EB/OL].[2014-05-10]. http://www.larc.usp.br/~pbarreto/AnubisPage.html. 被引量:1
  • 10DIFFIE W, HELLMAN M E. Special feature exhaustive cryptanalysis of the NBS data encryption standard[J]. Computer, 1977,10(6):74-84. 被引量:1

二级参考文献38

  • 1吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:20
  • 2Nakahara Jr J. A three-dimensional block cipher. CANS 2008, Lecture Notes in Computer Science, 2008, Vol. 5339: 252-267. 被引量:1
  • 3Daemen J and Rijmen V. AES Proposal: Rijndeal. http:// www.cryptolounge,org/wiki/AES _Proposah_ Rijndael, 1998, 08. 被引量:1
  • 4Daemen J, Knudsen L, and Rijmen V. The block cipher Square. FSE1997, Lecture Notes in Computer Science, Springer- Verlag, 1997, Vol. 1267: 149-165. 被引量:1
  • 5Lucks S. The saturation attack-a bait for twofish. FSE2002, Lecture Notes in Computer Science, Springer-Verlag, 2002, Vol. 2335: 1-15. 被引量:1
  • 6Ferguson N, Kelsey J, and Lucks S, et al.. hnproved cryptanalysis of Rijndeal. FSE2000, Lecture Notes in Computer Science, Springer-Verlag, 2001, Vol, 1978: 213-230. 被引量:1
  • 7Duo Lei, Li Chao, and Feng Ke-qin. Square like attack on Camellia. ICICS2007, Lecture Notes in Computer Science, Springer-Verlug, 2007, Vol. 4861: 269-283. 被引量:1
  • 8Muhammad Reza Z'aba, Havard Raddum, and Matt Henricksen, et al.. Bit-pattern based integral attack. FSE2008 Lecture Notes in Computer Science, Springer-Verlag, 2008, Vol. 5086: 363-381. 被引量:1
  • 9Barreto P and Rijmen V. The ANUBIS Block Cipher. http:// www.sciencecentral.com/site/497719, 2000, 06. 被引量:1
  • 10Nakahara J Jr.3D:A three-dimensional block cipher[C].CANS 2008,Springer-Verlag,2008,LNCS 5339:252-267. 被引量:1

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部