期刊文献+

SPECK分组密码算法的立方测试与分析

Cube Test and Analysis of SPECK Block Cipher Algorithm
在线阅读 下载PDF
导出
摘要 SPECK类算法是一类轻量级分组密码算法,由于其出色的平台适用性和软件实现性能而备受关注。针对当前SPECK类算法在抵御立方攻击以及算法内部结构对密钥比特的混淆和扩散方面存在安全隐患的问题,分别利用立方攻击结合二次测试和立方测试对SPECK32/64算法进行分析,在选择明文攻击条件下,若算法简化到3轮,可直接恢复17 bit密钥,攻击时间复杂度约为247,若算法简化到5轮-7轮,通过立方测试均能捕获到密钥中比特。结果表明,SPECK32/64算法需经过8轮以上的迭代操作才能有效抵抗立方分析。 SPECK is a family of lightweight block cipher algorithms.SPECK cipher receives much attention due to its excellent performance on platform applicability and software implementation.Aiming at the security risk of the SPECK algorithm in resisting cube attack as well as the confusion and diffusion of key bits in the internal structure of the algorithm,this paper applies cube attack on the SPECK32/64 algorithm by combining quadraticity tests with cube test.It finds that 17 bit key can be recovered with a time complexity of about 247 when the SPECK32/64 algorithm is simplified into three rounds.Applying cube test on five to seven rounds of SPECK32/64 algorithm,it is found that the key neutral-bit can be captured.So result shows that cube analysis can be effectively resisted,only if iteration of more than 8 rounds is applied to SPECK32/64.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第11期152-157,共6页 Computer Engineering
基金 国家自然科学基金(61572148) 广西自然科学基金(2015GXNSFGA139007) 广西高等学校优秀中青年骨干教师培养工程(第二期)项目 桂林电子科技大学研究生创新基金(ZYJ17061)
关键词 SPECK32/64密码算法 密钥中比特 立方测试 立方攻击 二次测试 SPECK32/64 cipher algorithm key neutral-bit cube test cube attack quadraticity test
  • 相关文献

参考文献2

二级参考文献65

  • 1eSTREAM-ECRYPT stream cipher project, http://www.ecrypt.eu.org/stream/.
  • 2Hell M, Johansson T. Breaking the F-FCSR-H stream cipher in real time. In: Pieprzyk J, ed. Proc. of the ASIACRYPT 2008. LNCS 5350, Heidelberg: Springer-Verlag, 2008. 557-569. [doi: 10.1007/978-3-540-89255-7_34].
  • 3Hell M, Johansson T, Meier W. Grain--A stream cipher for constrained environments, eSTREAM-ECRYPT Stream Cipher Project Report, 2005/010, 2005. http://www.ecrypt.eu.org/stream/ciphers/grain/grain.pdf [doi: 10.1504/IJWMC.2007.013798].
  • 4Berbain C, Gilbert H, Maximov A. Cryptanalysis of Grain. In: Robshaw MJB, ed. Proc. of the FSE 2006. LNCS 4047, Heidelberg: Springer-Verlag, 2006. 15-29. [doi: 10.1007/11799313_2].
  • 5Khazaei S, Hassanzadeh M, Kiaei M. Distinguishing attack on Grain. eSTREAM-ECRYPT Stream Cipher Project Report, 2005/071, 2005. http://www.ecrypt.eu.org/stream/papersdir/071.pdf.
  • 6Kucuk O. Slide resynchronization attack on the initialization of Grain 1.0. eSTREAM-ECRYPT Stream Cipher Project Report, 2006/044, 2006. http://www.ecrypt.eu.org/stream/papersdir/2006/044.ps.
  • 7Hell M, Johansson T, Maximov A, Meier W. The Grain family of stream ciphers. In: Robshaw M, Billet O, eds. Proc. of the New Stream Cipher Designs. LNCS 4986, Heidelberg: Springer-Verlag, 2008. 179-190. [doi: 10.1007/978-3-540-68351-3_14].
  • 8Hell M, Johansson T, Meier W. A stream cipher proposal: Grain-128. eSTREAM-ECRYPT Stream Cipher Project. 2006. http://www.ecrypt.eu.org/strearn/grainp3.html [doi: 10.1109/ISIT.2006.261549].
  • 9De Canniere C, Kucuk O, Preneel B. Analysis of Grain's initialization algorithm. In: Vaudenay S, ed. Proc. of the AFRICACRYPT 2008. LNCS 5023, Heidelberg: Springer-Verlag, 2008.276-289.
  • 10Zhang HN, Wang XY. Cryptanalysis of stream cipher Grain family. Cryptology ePrint Archive Report, 2009/109, 2009. http://eprint.iacr.org/2009/109/.

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部