期刊文献+

Keccak类S盒的线性性质研究 被引量:1

Research on Linear Properties of Keccak-like S-box
下载PDF
导出
摘要 该文将Keccak的S盒一般化为n元Keccak类S盒,研究了Keccak类S盒的线性性质。证明了这类S盒的相关优势的取值都为0或2-k,其中k∈Z且0≤k≤[2-1n],并且对于此范围内的任意k,都存在输入输出掩码使得相关优势取到2-k;证明了当输出掩码确定时,其非平凡相关优势都相等;给出了非平凡相关优势为最大值2-1时的充要条件与计数,解决了这类S盒的Walsh谱分布规律问题。 In this paper,the S-box of Keccak is generalized into n-variable Keccak-like S-box,and the linear properties of n-variable Keccak-like S-box is studied.It is proved that all the values of correlation advantages of this kind of S-box are 0 or 2-k,where k∈Z and 0≤k≤[2-1n],and for any k in this range,there is an input mask and an output mask that make the correlation advantage be 2-k.Furthermore,it is proved that when the output mask is fixed,the values of the nontrivial correlation advantages of the S-box are determined.Then,the necessary and sufficient condition are given when the count for the nontrivial correlation advantage is the maximum value 2-1.Finally,the value distribution of the Walsh spectrum of Keccak-like S-box is presented.
作者 关杰 黄俊君 GUAN Jie;HUANG Junjun(PLA SSF Information Engineering University,Zhengzhou 450001,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2020年第7期1790-1795,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61572516,61272041,61272488)。
关键词 哈希函数 Keccak S盒 线性性质 Hash function Keccak S-box Linear properties
  • 相关文献

参考文献5

二级参考文献19

  • 1NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family[J]. Federal Register Notices 72, 2007, 212: 62212-62220. 被引量:1
  • 2ANDREW R, RAY P, CHANG S J. Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition[R]. Infor marion Technology Laboratory National Institute of Standards and Technology, Gaithersburg, 2009. 被引量:1
  • 3MELTEM S T, RAY P, LAWRENCE E B, et al. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competi tion. Computer Security Division[R]. Information Technology Labo-ratory National Institute of Standards-and Technology, Gaithersburg, 2011. 被引量:1
  • 4NIST. The SHA-3 Finalists candidates U S department of commerce national information service[EB/OL], http://csrc, nist.gov. /groups/ ST/hash/sha-3/Round3/submissions-round3. html. 被引量:1
  • 5GUIDO B, JOAN D, MICHAEL P, et al. Keccak sponge function family maiia document[EB/OL], http://csrc, nist.gov /groups/ ST /hash /sha-3/Roundl/submissions roundl. Html. 被引量:1
  • 6罗岚,叶娅兰,许春香等.在信念网模型下的SHA3前五名算法注记[EB/OL].htcp://www.scienceet.cn/upload/blog/-ile/2010/12/2010121592436256375.pdf. 被引量:1
  • 7GUIDO B, JOAN D, MICHAEL P, et al. A belt-and-mill hash func- tion[EB/OL], http://radiogatun.noekeon.org. 被引量:1
  • 8JOAN D, CLAPP C S K. Fast hashing and stream encryption with PANAMA[A]. Fast Software Encryption 1998 (S Vaudenay, ed)[C]. 1998.60-74. 被引量:1
  • 9JOAN D. Cipher and Hash Function Design Strategies Based on Lin- ear and Differential Cryptanalysis[D]. Belgium: Katholieke Univer- sities Leuven, 1995. 被引量:1
  • 10EPHRAIM A. Sharing Nonlinear Gates in the Presence of Glitches[D]. Enschede, Holland: University of Twente, 2010. 被引量:1

共引文献23

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部