一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

MD-64算法的相關(guān)密鑰-矩形攻擊

郭建勝 崔競(jìng)一 羅偉 劉翼鵬

郭建勝, 崔競(jìng)一, 羅偉, 劉翼鵬. MD-64算法的相關(guān)密鑰-矩形攻擊[J]. 電子與信息學(xué)報(bào), 2015, 37(12): 2845-2851. doi: 10.11999/JEIT150049
引用本文: 郭建勝, 崔競(jìng)一, 羅偉, 劉翼鵬. MD-64算法的相關(guān)密鑰-矩形攻擊[J]. 電子與信息學(xué)報(bào), 2015, 37(12): 2845-2851. doi: 10.11999/JEIT150049
Guo Jian-sheng, Cui Jing-yi, Luo Wei, Liu Yi-peng. Related-key Rectangle Attack on MD-64[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2845-2851. doi: 10.11999/JEIT150049
Citation: Guo Jian-sheng, Cui Jing-yi, Luo Wei, Liu Yi-peng. Related-key Rectangle Attack on MD-64[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2845-2851. doi: 10.11999/JEIT150049

MD-64算法的相關(guān)密鑰-矩形攻擊

doi: 10.11999/JEIT150049 cstr: 32379.14.JEIT150049
基金項(xiàng)目: 

博士后科學(xué)基金(2014M562582)

Related-key Rectangle Attack on MD-64

Funds: 

China Postdoctoral Science Foundation (2014M562582)

  • 摘要: 該文針對(duì)MD-64分組密碼算法在相關(guān)密鑰-矩形攻擊下的安全性進(jìn)行了研究。分析了算法中高次DDO (Data Dependent Operations)結(jié)構(gòu)、SPN結(jié)構(gòu)在輸入差分重量為1時(shí)的差分轉(zhuǎn)移規(guī)律,利用高次DDO結(jié)構(gòu)的差分特性和SPN結(jié)構(gòu)重量為1的差分路徑構(gòu)造了算法的兩條相關(guān)密鑰-差分路徑,通過連接兩條路徑構(gòu)造了算法的完全輪的相關(guān)密鑰-矩形區(qū)分器,并對(duì)算法進(jìn)行了相關(guān)密鑰-矩形攻擊,恢復(fù)出了32 bit密鑰。攻擊算法所需的數(shù)據(jù)復(fù)雜度為262相關(guān)密鑰-選擇明文,計(jì)算復(fù)雜度為291.6次MD-64算法加密,存儲(chǔ)復(fù)雜度為266.6 Byte存儲(chǔ)空間,成功率約為0.961。分析結(jié)果表明,MD-64算法在相關(guān)密鑰-矩形攻擊條件下的安全性無法達(dá)到設(shè)計(jì)目標(biāo)。
  • Sareh E, San L, Ivica N, et al.. The resistance of PRESENT-80 against related-key differential attacks[J]. Cryptography and Communications, 2014, 6(3): 171-187.
    Yuseop L, Kitae J, Changhoon L, et al.. Related-key cryptanalysis on the full PRINTcipher suitable for IC- printing[J]. International Journal of Distributed Sensor Networks, 2014(1): 1-10.
    Wen L, Wang M Q, and Zhao J Y. Related-key impossible differential attack on reduced-round LBlock[J]. Journal of Computer Science and Technology, 2014, 29(1): 165-176.
    詹英杰, 關(guān)杰, 丁林, 等. 對(duì)簡(jiǎn)化版LBLock 算法的相關(guān)密鑰不可能差分攻擊[J]. 電子與信息學(xué)報(bào), 2012, 34(9): 2161-2166.
    Zhan Y J, Guan J, Ding L, et al.. Related-key impossible differential attack on reduced round LBlock[J]. Journal of Electronics Information Technology, 2012, 34(9): 2161-2166.
    Chen J G and Atsuko M. Differential cryptanalysis and boomerang cryptanalysis of LBlock[C]. The International Cross Domain Conference and Workshops 2013, Regensburg, Germany, 2013: 1-15.
    Jongsung K, Seokhie H, Bart P, et al.. Related-key boomerang and rectangle attacks: theory and experimental analysis[J]. IEEE Transactions on Information Theory, 2012, 58(7): 4948-4966.
    Takanori I, Yu S, and Jiageng C. Related-key boomerang attacks on KATAN32/48/64[C]. Australasian Conference on Information Security and Privacy 2013, Brisbane, Australia, 2013: 268-285.
    Ashur T and Dunkelman O. A practical related-key boommerang attack for the full MMB block cipher[C]. Cryptology and Network Security 2013, Paraty, Brazil, 2013: 271-290.
    Moldovyan A and Moldovyan N. A cipher based on data-dependent permutation[J]. Journal of Cryptology, 2002, 15(1): 61-72.
    Moldovyan A, Moldovyan N, and Sklavos N. Controlled elements for designing ciphers suitable to efficient VLSI implementation[J]. Telecommunication System, 2006, 32(2): 149-163.
    Nguyen Hieu-minh, Do Thi-bac, and Ho Ngoc-duy. New SDDO-based block cipher for wireless sensor network security[J]. International Journal of Computer Science and Network Security, 2010, 10(3): 54-60.
    Sklavos N, Moldvyan N A, and Koufopavlou O. High speed networking security: design and implementation of two new DDP-based ciphers[J]. Mobile Networks and Applications- MONET, 2005, 10(1/2): 219-231.
    Moldovyan N, Sklavos N, and Moldovyan A. CHESS-64, a block cipher based on data-dependent operations: design variants and hardware implementation efficiency[J]. Asian Journal of Information Technology, 2005, 4(4): 323-334.
    Bac Do-thi, Minh Nguyen-hieu, and Duy Ho-ngoc. An effective and secure cipher based on SDDO[J]. International Journal of Computer Network and Information Security, 2012, 4(11): 1-10.
    Chang-Hoon L. Security analysis of block cipher MD-64 suitable for wireless sensor network environments[J]. Journal of Korea Navigation Institute, 2011, 15(5): 865-869.
    Jinkeon K, Kitae J, Sang-Soo Y, et al.. Related-key attack on the MD-64 block cipher suitable for pervasive computing environments[C]. International Conference on Advanced Information Networking and Applications Workshops, Fukuoka, Japan, 2012: 726-731.
    Biham E, Dunkelman O, and Keller N. Related-key boomerang and rectangle attacks[C]. EUROCRYPT 2005, Aarhus, Denmark, 2005: 507-525.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1505
  • HTML全文瀏覽量:  125
  • PDF下載量:  446
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-01-08
  • 修回日期:  2015-09-15
  • 刊出日期:  2015-12-19

目錄

    /

    返回文章
    返回