期刊文献+

分组密码AES的非平衡Biclique结构性质 被引量:1

Unbalance Biclique structure properties of block cipher AES
下载PDF
导出
摘要 Biclique攻击是目前唯一能将对AES全轮攻击降至穷举攻击之下的密钥恢复攻击,Biclique结构决定着攻击算法的复杂性,为了提高对全轮AES的Biclique攻击的效率,研究了AES的非平衡Biclique结构性质。通过分析AES编码环节对Biclique结构的影响,给出了寻找AES非平衡Biclique结构的算法思路及其相关性质,对于AES-128、AES-192、AES-256三种密码模型,分别给出了其非平衡Biclique结构的分布特征,具体列出了初始差分活动字节个数达到最小或最大的非平衡Biclique结构。 The current Biclique attack is the only key recovery method for the full AES faster than brute-force,and the Biclique structure decides the complexity of the attack algorithm.In order to improve the Biclique attack efficiency for the full AES,this paper researched on unbalance Biclique structure properties of AES.Through the analysis of the AES code segment influence on the Biclique structure,this paper designed algorithms to find unbalance Biclique structures and got their corresponding properties.For three versions AES-128,AES-192 and AES-256,this paper gave distribution characteristics of their unbalance Biclique structures respectively and presented two special unbalance Biclique structures with the minimum or maximum number of initial difference active bytes.
作者 李云强 卢一强 王念平 Li Yunqiang;Lu Yiqiang;Wang Nianping(Institute of Cryptography Engineering,University of Information Engineering,Zhengzhou 450001,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第5期1566-1568,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(61672031)
关键词 分组密码AES Biclique攻击 Biclique结构 非平衡Biclique结构 block cipher AES Biclique attack Biclique structure unbalance Biclique structure
  • 相关文献

参考文献2

二级参考文献19

  • 1DAEMEN J and RIJMEN V. The design of Rijndael: AES- the advanced encryption standard[S]. Springer-Verlag, 2002. 被引量:1
  • 2NIELS F, JOHN K, STEFAN L, et al. Improved cryptanalysis of Rijndael[J]. LNCS, 2000, 1978: 213-230. 被引量:1
  • 3HENRI G and MARINE M. A collision attack on 7 rounds of Rijndael[C]. Third AES Candidate Conference, New York, USA, 2000: 230-241. 被引量:1
  • 4TYGE T, LARS R, STEFAN K, et al. Security of the AES with a secret S-box[EB/OL]. http://eprint.iacr.org/2015/144. 2015.2. 被引量:1
  • 5CHRISTOF B, PHILIPP J, MARTIN M, et al. Analyzing permutations for AES-like ciphers: understanding ShiftRows [EB/OL]. http://eprint.iacr.org/2015/212. 2015.3. 被引量:1
  • 6HAMID M, MOHAMMAD D, RIJMEN V, et al. Improved impossible differential cryptanalysis of 7-round AES-128[J]. LNCS, 2010, 6498: 282-291. 被引量:1
  • 7DUNKELMAN O, KELLER N, and SHAMIR A. Improved single-key attacks on 8-round AES-192 and AES-256[J]. LNCS, 2010, 6477: 158-176. 被引量:1
  • 8PATRICK D and PIERRE-ALAIN F. Exhausting Demirci- Sel?uk meet-in-the-middle attacks against reduced-round AES[EB/OL]. http://eprint.iacr.org/ 2015/ 259. 2015.3. 被引量:1
  • 9J?R?MY J, MARIA N, and THOMAS P. Improved cryptanalysis of AES-like permutations[EB/OL]. http://eprint. iacr.org/2015/279. 2015.3. 被引量:1
  • 10DMITRY K, CHRISTIAN R, and ALEXANDRA S. Bicliques for preimages: attacks on Skein-512 and the SHA-2 family[C]. 19th International Workshop on Fast Software Encryption, Washington DC, USA, 2012: 244-263. 被引量:1

共引文献1

同被引文献5

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部