A Method of Constructing Impossible Differential Distinguishers Based on Completeness
Funds:
The National Natural Science Foundation of China (61572516, 61272041, 61272488)
-
摘要: 基于混合運算的密碼算法(MOC)以安全性高、軟硬件實現(xiàn)效率高等特點受到人們的廣泛關(guān)注。完全性指輸出的每一比特都包含有輸入每一比特的信息,達到完全性是密碼算法設(shè)計的一個基本原則。該文提出針對MOC算法完全性分析的通用算法,并在此基礎(chǔ)上提出利用完全性尋找MOC算法的不可能差分區(qū)分器的方法,此構(gòu)造方法可直接給出MOC算法高重量的不可能差分區(qū)分器且搜索效率高,為MOC算法不可能差分區(qū)分器的實際構(gòu)造提供了理論指導(dǎo)和技術(shù)支持。應(yīng)用此方法找到了SIMON系列算法全部現(xiàn)有的最長不可能差分區(qū)分器,并找到了SPECK系列算法更多的不可能差分區(qū)分器。
-
關(guān)鍵詞:
- 基于混合運算密碼算法 /
- 不可能差分區(qū)分器 /
- 完全性 /
- SIMON /
- SPECK
Abstract: Mixed Operation based Ciphers (MOC) attract cryptographers owing to their high security and high efficiency on both software and hardware platforms. As a basic principle of cryptosystem design, completeness refers to that every output bit contains the information of every input bit. This paper presents a universal algorithm of completeness analysis against MOC. Based on the algorithm, a method of constructing impossible differential distinguishers utilizing completeness is proposed. This method constructs heavy weight impossible differential distinguishers directly with high efficiency. The method can provide theory and technology direction for the construction of impossible differential distinguishers. Then, this paper analysis SIMON and SPECK with this method and introduces all the longest impossible differential distinguishers of SIMON currently public and new impossible differential distinguishers of SPECK. -
WU Wenling, ZHANG Wentao, and FENG Dengguo. Impossible differential cryptanalysis of reduced-round ARIA and Camellia[J]. Journal of Computer Science and Technology, 2007, 22(3): 449-456. doi: 10.1007/s11390-007- 9056-0. 付立仕, 金晨輝. MIBS-80的13輪不可能差分分析[J]. 電子與信息學報, 2016, 38(4): 848-855. doi: 10.11999/JEIT150673. FU Lishi and JIN Chenhui. Impossible differential cryptanalysis on 13-round MIBS-80[J]. Journal of Electronics Information Technology, 2016, 38(4): 848-855. doi: 10.11999/JEIT150673. 唐學海, 李超, 王美一, 等. 3D密碼的不可能差分攻擊[J]. 電子與信息學報, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J. 1146.2009.01375. TANG Xuehai, LI Chao, WANG Meiyi, et al. Impossible differential attack on 3D cipher[J]. Journal of Electronics Information Technology, 2010, 32(10): 2516-2520. doi: 10.3724/SP.J.1146.2009.01375. 張凱. 基于混合運算密碼模型的安全性研究[D]. [博士論文], 信息工程大學, 2016. ZHANG Kai. Research on the security evaluation against mixed operation based cipher model[D]. [Ph.D. dissertation], Information Engineering University, 2016. HONG D, SUNG J, HONG S, et al. HIGHT: A new block cipher suitable for low-resource device[C]. International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, 2006: 46-59. doi: 10.1007/11894063_4. BEAULIEU R, TREATMAN-CLARK S, SHORS D, et al. The SIMON and SPECK lightweight block ciphers[C]. 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), Texas, 2015: 1-6. doi: 10.1145/2744769.2747946. BIHAM E, BIRYUKOV A, and SHAMIR A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials [C]. International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech, 1999: 12-23. doi: 10.1007/3-540-48910-X_2. National Security Agency. Skipjack and KEA algorithm specifications, Version 2.0.[OL]. http: scrc.nist.gov/ Crypto Toolkit/skipjack/skipjack-kea.htm. 1998. BIHAM E, DUNKELMAN O, and KELLER N. Related-key impossible differential attacks on 8-round AES-192[C]. Topics in Cryptology-CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, 2006: 21-33. doi: 10.1007/11605805_2. CHEN J, WANG M, and PRENEEL B. Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT[C]. International Conference on Cryptology in Africa. Ifrance, Morocco, 2012: 117-137. doi: 10.1007/978-3-642-31410-0_8. SUN Siwei, HU Lei, WANG Peng, et al. Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers[C]. International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 2014: 158-178. doi: 10.1007 /978-3-662-45611-8_9. 李俊志. 三類非線性反饋移存器模型的代數(shù)性質(zhì)研究及應(yīng)用[D]. [碩士論文], 信息工程大學, 2015. LI Junzhi. Algebraic properties and applications on three non-linear feedback models[D]. [Master. dissertation], Information Engineering University, 2015. 金晨輝, 鄭浩然, 張少武, 等. 密碼學[M]. 北京: 高等教育出版社, 2009: 166-167. JIN Chenhui, ZHENG Haoran, ZHANG Shaowu, et al. Cryptography[M]. Beijing: Higher Education Press, 2009: 166-167. -
計量
- 文章訪問數(shù): 1360
- HTML全文瀏覽量: 218
- PDF下載量: 145
- 被引次數(shù): 0