一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

Feistel-SPS結(jié)構(gòu)的反彈攻擊

董樂 鄒劍 吳文玲 杜蛟

董樂, 鄒劍, 吳文玲, 杜蛟. Feistel-SPS結(jié)構(gòu)的反彈攻擊[J]. 電子與信息學報, 2016, 38(8): 1928-1934. doi: 10.11999/JEIT151255
引用本文: 董樂, 鄒劍, 吳文玲, 杜蛟. Feistel-SPS結(jié)構(gòu)的反彈攻擊[J]. 電子與信息學報, 2016, 38(8): 1928-1934. doi: 10.11999/JEIT151255
DONG Le, ZOU Jian, WU Wenling, DU Jiao. Rebound Attack on the Feistel-SPS Structure[J]. Journal of Electronics & Information Technology, 2016, 38(8): 1928-1934. doi: 10.11999/JEIT151255
Citation: DONG Le, ZOU Jian, WU Wenling, DU Jiao. Rebound Attack on the Feistel-SPS Structure[J]. Journal of Electronics & Information Technology, 2016, 38(8): 1928-1934. doi: 10.11999/JEIT151255

Feistel-SPS結(jié)構(gòu)的反彈攻擊

doi: 10.11999/JEIT151255
基金項目: 

國家自然科學基金(61402154, U1404601, 11471104, 11171093),河南省高??萍紕?chuàng)新團隊支持計劃(14IRTSTHN023)

Rebound Attack on the Feistel-SPS Structure

Funds: 

National Natural Science Foundation of China (61402154, U1404601, 11471104, 11171093), Program for Innovative Research Team (in Science and Technology) in University of Henan Province (14IRTSTHN023)

  • 摘要: 該文給出了以Feistel結(jié)構(gòu)為主框架,以SPS(Substitution-Permutation-Substitution)函數(shù)作為輪函數(shù)的Feistel-SPS結(jié)構(gòu)的反彈攻擊。通過對差分擴散性質(zhì)的研究,得到這一結(jié)構(gòu)的6輪已知密鑰截斷差分區(qū)分器,并在此區(qū)分器的基礎(chǔ)上,給出將這一結(jié)構(gòu)內(nèi)嵌入MMO(Matyas-Meyer-Oseas)和MP(Miyaguchi-Preneel)模式所得到的壓縮函數(shù)的近似碰撞攻擊。此外,還將6輪截斷差分區(qū)分器擴展,得到了7輪的截斷差分路徑,基于此還得到上述兩種模式下壓縮函數(shù)的7輪截斷差分區(qū)分器。
  • U.S. Department of Commerce and National Institute of Standards and Technology. FIPS PUB 46-3[S]. 1999.
    WU Wenling and ZHANG Lei. LBlock: a lightweight block cipher[C]. 9th International Conference on Applied Cryptography and Network Security-ACNS 2011, Nerja, Spain, 2011: 327-344. doi: 10.1007/978-3-642-21554-4_19.
    BOGDANOV A and SHIBUTANI K. Double SP-functions: enhanced generalized Feistel networks[C]. 16th Australasian Conference on Information Security and Privacy-ACISP 2011, Melbourne, Australia, 2011: 106-119. doi: 10.1007/978-3-642- 22497-3_8.
    SHIBUTANI K, ISOBE T, HIWATARI H, et al. Piccolo: an ultra-lightweight blockcipher[C]. 13th International Workshop on Cryptographic Hardware and Embedded Systems-CHES 2011, Nara, Japan, 2011: 342-357. doi: 10.1007/978-3-642-23951-9_23.
    KNUDSEN L R and RIJMEN V. Known-key distinguishers for some block ciphers[C]. 13th International Conference on the Theory and Application of Cryptology and Information Security-ASIACRYPT 2007, Kuching, Malaysia, 2007: 315-324. doi: 10.1007/978-3-540-76900-2_19.
    BLONDEAU C, PEYRIN T, and WANG L. Known-key distinguisher on full PRESENT[C]. 35th Annual Cryptology Conference on Advances in Cryptology-CRYPTO 2015, Santa Barbara, USA, 2015: 455-474. doi: 10.1007/978-3-662- 47989-6_22.
    ANDREEVA E, BOGDANOV A, and MENNINK B. Towards understanding the known-key security of block ciphers[C]. 20th International Workshop on Fast Software Encryption-FSE 2013, Singapore, 2013: 348-366. doi: 10.1007 /978-3-662-43933-3_18.
    ZHA Daren, WU Shuang, and WANG Qiongxiao. Improved known-key distinguisher on round-reduced 3D block cipher[J]. Chinese Journal of Electronics, 2015, 24(1): 199-204. doi: 10.1049/cje.2015.01.033.
    AOKI K. A property for full CLEFIA-128 detected by a middletext distinguisher under the known-key setting[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2014, 97(1): 292-297. doi: 10.1587/transfun.E97.A.292.
    SASAKI Y and YASUDA K. Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes[C]. 18th International Workshop on Fast Software Encryption- FSE 2011, Lyngby, Denmark, 2011: 397-415. doi: 10.1007/ 978-3-642-21702-9_23.
    HYUNGCHUL K, DEUKJO H, DUKJAE M, et al. Known-key attacks on generalized Feistel schemes with SP round function[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012, 95(9): 1550-1560. doi: 10.1587/transfun.E95.A.1550.
    DONG Le, WU Wenling, WU Shuang, et al. Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes[J]. Frontiers of Computer Science, 2014, 8(3): 513-525. doi: 10.1007/s11704-014-2412-7.
    DONG Le, WANG Yanling, WU Wenling, et al. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitutionpermutation functions and near-collision attacks on its hashing modes[J]. IET Information Security, 2015, 9(5): 277-283. doi: 10.1049/ iet-ifs.2014.0402.
    SASAKI Y. Double-sp is weaker than single-sp: rebound attacks on Feistel ciphers with several rounds[C]. 13th International Conference on Progress in Cryptology- INDOCRYPT 2012, Kolkata, India, 2012: 265-282. doi: 10.1007/978-3-642-34931-7_16.
    MENDEL F, RECHBERGER C, SCHLFFER M, et al. The rebound attack: cryptanalysis of reduced Whirlpool and Grstl[C]. 16th International Workshop on Fast Software Encryption-FSE 2009, Leuven, Belgium, 2009: 260-276. doi: 10.1007/978-3-642-03317-9_16.
    SASAKI Y, LI Y, WANG L, et al. Non-full-active Super-Sbox analysis: applications to ECHO and Grstl[C]. 16th International Conference on Advances in Cryptology- ASIACRYPT 2010, Singapore, 2010: 38-55. doi: 10.1007/ 978-3-642-17373-8_3.
  • 加載中
計量
  • 文章訪問數(shù):  1311
  • HTML全文瀏覽量:  147
  • PDF下載量:  455
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-11-09
  • 修回日期:  2016-04-08
  • 刊出日期:  2016-08-19

目錄

    /

    返回文章
    返回