期刊文献+

一种新的Square攻击 被引量:3

A new type of Square attack
下载PDF
导出
摘要 对美国高级加密标准Rijndael算法的Square攻击是一种利用平衡性实施攻击的方法.研究发现平衡性改变总是伴随着活动性的改变,从而提出一种基于生日悖论、利用活动性进行的新的攻击方法.结合平衡性进行攻击,获得更好的性能:速度提高10倍,所需的选择明文量降低为十分之一. The famous Square attacks against the AES algorithm Rijndael have taken advantage of the change of the balance of some byte. Further study shows that the change of the activity always happens before the change of the balance, which lays the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of this round. The existence of the birthday paradox guarantees that the plaintexts necessary for activity attacks are much fewer than those for the corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the stimulation shows that the consumed time and chosen plaintexts necessary are both reduced to one tenth those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2003年第4期473-476,共4页 Journal of Xidian University
基金 国家973项目资助(G1999035804) 863重大项目(2002AA143021) "十五"国家密码发展基金资助项目
关键词 高级加密标准 RIJNDAEL算法 SQUARE攻击 平衡性 生日悖论 密码 AES Rijndael algorithm birthday paradox cryptanalysis
  • 相关文献

参考文献7

  • 1胡予濮,肖国镇,张建中.基于分组密码的加密认证码[J].西安电子科技大学学报,1999,26(2):240-242. 被引量:1
  • 2Daemen J, Rijmen V, AES Proposal Rijndael[EB/OL]. http://csrc.nist.gov/encryption/aes, 1999-10-05. 被引量:1
  • 3NIST, FIPSI97 Advanced Encryption Standard[S]. 2001. 被引量:1
  • 4Gilbert H, Minier M, A Collision Attack on 7 Rounds of Rijndael[A]. The Third Advanced Encryption Standard Candidate Conference[C]. Gaithearsburg: NIST, 2000. 230-241. 被引量:1
  • 5Biham E, Kellery N. Cryptanalysis of Reduced Variants of Rijndael[EB/OL]. http://csrc. nist. gov/encryption/aes/round2/conf3/aes3papapers. html, 2001-01-26. 被引量:1
  • 6Lucks S. Attacking Seven Bounds of Rijndael under 192-bit and 256-bit Keys[A]. The Third Advanced Encryption Standard Candidate Conference[C]. Gaithersburg: NIST, 2000. 215-229. 被引量:1
  • 7Ferguson N, Kelsey J, Schneier B, et al. Improved Cryptanalysis of Rijndael[A]. Fast Software Encryption[C]. Berlin: Springer-Verlag, 2000. 213-230. 被引量:1

二级参考文献11

同被引文献26

  • 1李清玲,李超.变种Camellia对Square攻击的安全性[J].应用科学学报,2006,24(5):485-490. 被引量:2
  • 2张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 3Daemen J, Knudsen L, Rijmen V. The Block Cipher Square [ C]//Fast Software Encryption 1997 ,Lecture Notes in Computer Science,1267. [s. l ] : [s. n. ] ,1997:149-165. 被引量:1
  • 4Koo B, Yeom Y, Song J. Related-Key Boomerang Attack on Block Cipher Square [ EB/OL]. 2010. http://eprint, iacr. org/. 被引量:1
  • 5Demirei H, Selcuk A A. A Meet-in-the-Middle Attack on 8- Round AES [ C ] // Fast Software Eneryption 2008, Lecture Notes in Computer Science5086. [ s. l. ] : [ s. n. ] ,2008 : 116- 126. 被引量:1
  • 6Koblitz N. A course in number theory and cryptography[ M]. New York : Springer-Verlag, 1987. 被引量:1
  • 7Dunkelman O, Keller N, Sharnir A. Improved Single-Key Attack on 8-round AES [ EB/OL ]. 2010. http ://eprint. iacr. org/. 被引量:1
  • 8Demirci H, Taskm I, Coban M, et al. Improved Meet-in-the-middle Attacks on AES[ C] //Lecture Notes in Computer Science ,5922. [ s. l.]: [ s. n. ] ,2009. 被引量:1
  • 9冯国登,吴文玲.分组密码的分析和设计[M].北京:清华大学出版社,2000. 被引量:1
  • 10Office of State Commercial Cipher Administration. Block Cipher for WLAN Products-SMS4[EB/OL]. [2006-12-23]. http://www, oscca, gov. cn/UpFile/2006021016423197990. 被引量:1

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部