Keccak類S盒的線性性質(zhì)研究
doi: 10.11999/JEIT190570 cstr: 32379.14.JEIT190570
-
戰(zhàn)略支援部隊(duì)信息工程大學(xué) 鄭州 450001
Research on Linear Properties of Keccak-like S-box
-
PLA SSF Information Engineering University, Zhengzhou 450001, China
-
摘要:
該文將Keccak的S盒一般化為n元Keccak類S盒,研究了Keccak類S盒的線性性質(zhì)。證明了這類S盒的相關(guān)優(yōu)勢的取值都為0或
\begin{document}${2^{ - k}}$\end{document} ,其中
且
,并且對于此范圍內(nèi)的任意k,都存在輸入輸出掩碼使得相關(guān)優(yōu)勢取到
;證明了當(dāng)輸出掩碼確定時(shí),其非平凡相關(guān)優(yōu)勢都相等;給出了非平凡相關(guān)優(yōu)勢為最大值
時(shí)的充要條件與計(jì)數(shù),解決了這類S盒的Walsh譜分布規(guī)律問題。
Abstract:In this paper, the S-box of Keccak is generalized into n-variable Keccak-like S-box, and the linear properties of n-variable Keccak-like S-box is studied. It is proved that all the values of correlation advantages of this kind of S-box are 0 or
\begin{document}${2^{ - k}}$\end{document} , where
and
, and for any k in this range, there is an input mask and an output mask that make the correlation advantage be
. Furthermore, it is proved that when the output mask is fixed, the values of the nontrivial correlation advantages of the S-box are determined. Then, the necessary and sufficient condition are given when the count for the nontrivial correlation advantage is the maximum value
. Finally, the value distribution of the Walsh spectrum of Keccak-like S-box is presented.
-
Key words:
- Hash function /
- Keccak /
- S-box /
- Linear properties
-
BERTONI G, DAEMEN J, PEETERS M, et al. Keccak[C]. The 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Athens, Greece, 2013: 313–314. NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family[EB/OL]. http://www.nist.gov/hash-competition, 2007. 王永娟, 王濤, 袁慶軍, 等. 密碼算法旁路立方攻擊改進(jìn)與應(yīng)用[J]. 電子與信息學(xué)報(bào), 2020, 42(5): 1087–1093. doi: 10.11999/JEIT181075WANG Yongjuan, WANG Tao, YUAN Qingjun, et al. Side channel cube attack improvement and application on cryptographic algorithm[J]. Journal of Electronics &Information Technology, 2020, 42(5): 1087–1093. doi: 10.11999/JEIT181075 趙軍, 曾學(xué)文, 郭志川. 支持國產(chǎn)密碼算法的高速PCIe密碼卡的設(shè)計(jì)與實(shí)現(xiàn)[J]. 電子與信息學(xué)報(bào), 2019, 41(10): 2402–2408. doi: 10.11999/JEIT190003ZHAO Jun, ZENG Xuewen, and GUO Zhichuan. Design and implementation of high speed PCIe cipher card supporting GM algorithms[J]. Journal of Electronics &Information Technology, 2019, 41(10): 2402–2408. doi: 10.11999/JEIT190003 DAEMEN J. Cipher and hash function design strategies based on linear and differential cryptanalysis[D]. [Ph.D. dissertation], Katholieke Universiteit Leuven, 1995: 23–58. BERTONI G M, DAEMEN J, PEETERS M, et al. RadioGatún, a belt-and-mill hash function[C]. The 2nd Cryptographic Hash Workshop, Santa Barbara, USA, 2006: 24–25. GUO Xu, SRIVASTAV M, HUANG Sinan, et al. ASIC implementations of five SHA-3 finalists[C]. 2012 Design, Automation & Test in Europe Conference & Exhibition, Dresden, Germany, 2012: 1006–1011. JOSHI P, MUKHOPADHYAY D, and ROYCHOWDHURY D. Design and analysis of a robust and efficient block cipher using cellular automata[C]. The 20th International Conference on Advanced Information Networking and Applications, Vienna, Austria, 2006: 67–71. MANZONI L and MARIOT L. Cellular automata pseudo-random number generators and their resistance to asynchrony[C]. The 13th International Conference on Cellular Automata for Research and Industry, Como, Italy, 2018: 428–437. PICEK S, MARIOT L, YANG Bohan, et al. Design of S-boxes defined with cellular automata rules[C]. The Computing Frontiers Conference, Siena, Italy, 2017: 409–414. MARIOT L, PICEK S, LEPORATI A, et al. Cellular automata based S-boxes[J]. Cryptography and Communications, 2019, 11(1): 41–62. doi: 10.1007/s12095-018-0311-8 BAO Zhenzhen, GUO Jian, LING San, et al. PEIGEN-a platform for evaluation, implementation, and generation of S-boxes[J]. IACR Transactions on Symmetric Cryptology, 2019(1): 330–394. doi: 10.13154/tosc.v2019.i1.330-394 GHOSHAL A, SADHUKHAN R, PATRANABIS S, et al. Lightweight and side-channel secure 4×4 S-boxes from cellular automata rules[J]. IACR Transactions on Symmetric Cryptology, 2018(3): 311–334. doi: 10.13154/tosc.v2018.i3.311-334 關(guān)杰, 黃俊君. 一類新的基于元胞自動機(jī)的S盒的密碼學(xué)性質(zhì)研究[J]. 通信學(xué)報(bào), 2019, 40(5): 192–200.GUAN Jie and HUANG Junjun. Research on cryptographic properties of a new S-box based on cellular automaton[J]. Journal on Communications, 2019, 40(5): 192–200. 李倩男, 李云強(qiáng), 蔣淑靜, 等. Keccak類非線性變換的差分性質(zhì)研究[J]. 通信學(xué)報(bào), 2012, 33(9): 140–146.LI Qiannan, LI Yunqiang, JIANG Shujing, et al. Research on differential properties of Keccak-like nonlinear transform[J]. Journal on Communications, 2012, 33(9): 140–146. 李倩男. Keccak類雜湊函數(shù)研究[D]. [碩士論文], 信息工程大學(xué), 2013: 30–36.LI Qiannan. Research on Keccak-like Hash function[D]. [Master Dissertation], The PLA Information Engineering University, 2013: 30–36. 金晨輝, 鄭浩然, 張少武, 等. 密碼學(xué)[M]. 北京: 高等教育出版社, 2009: 30–36.JIN Chenhui, ZHENG Haoran, ZHANG Shaowu, et al. Cryptography[M]. Beijing: Higher Education Press, 2009: 30–36. -
計(jì)量
- 文章訪問數(shù): 2595
- HTML全文瀏覽量: 1034
- PDF下載量: 79
- 被引次數(shù): 0