浏览全部资源
扫码关注微信
[ "李荣佳(1991-),男,山东泗水人,解放军信息工程大学硕士生,主要研究方向为对称密码设计与分析。" ]
[ "金晨辉(1965-),男,河南扶沟人,解放军信息工程大学教授,主要研究方向为密码学与信息安全。" ]
网络出版日期:2016-08,
纸质出版日期:2016-08-25
移动端阅览
李荣佳, 金晨辉. FOX算法的中间相遇攻击[J]. 通信学报, 2016,37(8):185-190.
IRong-jia L, INChen-hui J. Meet-in-the-middle attacks on FOX block cipher[J]. Journal on communications, 2016, 37(8): 185-190.
李荣佳, 金晨辉. FOX算法的中间相遇攻击[J]. 通信学报, 2016,37(8):185-190. DOI: 10.11959/j.issn.1000-436x.2016168.
IRong-jia L, INChen-hui J. Meet-in-the-middle attacks on FOX block cipher[J]. Journal on communications, 2016, 37(8): 185-190. DOI: 10.11959/j.issn.1000-436x.2016168.
研究了FOX分组密码算法在中间相遇攻击下的安全性。首先,分别构造了FOX64和FOX128的3轮中间相遇区分器,实施了6轮中间相遇攻击,得到对6轮FOX64和FOX128较好的攻击结果。其次,将FOX128的中间相遇区分器扩展到4轮,并结合时间存储数据折衷的方法,攻击了7轮FOX128,与已有的攻击结果相比,攻击的时间复杂度和存储复杂度略大,而数据复杂度明显降低。
The security of the block cipher FOX against meet-in-the-middle attack was analyzed.Firstly
3-round meet-in-the-middle distinguishers was constructed and 6-round meet-in-the-middle attacks for FOX64 and FOX128 was proposed.The two attacks were beter attacks for 6-round FOX64 and FOX128
respectively.Secondly
the meet-in-the-middle distinguisher was extended of FOX128 to 4 rounds and proposed 7-round meet-in-the-middle attack combined with time/memory/data tradeoff.Compared to the currently known attacks on 7-round FOX128
The attack has a greater time and memory complexity
however the data complexity is much smaller.
JUNOD P , VAUDENAY S , SHACHAM H . FOX:a new family of block ciphers [C ] // Lecture Notes in Computer Science,2004 . c 2004 : 131 - 146 .
WU W , ZHANG W , FENG D . cryptanalysis of reduced FOX block cipher [J ] . Lecture Notes in Computer Science , 2005 , 3935 ( 1 ): 229 - 241 .
WU Z M , LAI X J , ZHU B , et al . Impossible differential cryptanalysis of FOX [EB/OL ] . IACR Cryptology ePrint Archive , 2009 .
CHEN J , HU Y P , ZHANG Y Y , et al . Differential collision attack on re-duced fox block cipher [J ] . China Communications , 2012 , 9 ( 7 ): 71 - 76 .
郭瑞 , 金晨辉 . 低轮 FOX64 算法的零相关-积分分析 [J ] . 电子与信息学报 , 2015 , 37 ( 2 ): 417 - 422 .
GUO R , JIN C H . Integral cryptanalysis of reduced round FOX64 [J ] . Jour-nal of Electronics & Information Technology , 2015 , 37 ( 2 ): 417 - 422 .
伊文坛 , 陈少真 . FOX 密码的多维零相关线性分析 [J ] . 密码学报 , 2015 , 2 ( 1 ): 27 - 39 .
YI W T , CHEN S Z . Multidimensional zero-correlation linear attacks on Fox block cipher [J ] . Journal of Cryptologic Research , 2015 , 2 ( 1 ): 27 - 39 .
ISOBE T , SHIBUTANI K . Improved all-subkeys recovery attacks on FOX,KATAN and SHACAL-2 block ciphers [C ] // FSE 2014 . c 2014 : 104 - 126 .
DEMIRCI H , SELÇUK A . A Meet-in-the-middle attack on 8-round AES [C ] // Lecture Motes in Computer Science . Lausanne,Switzerland c 2008 : 116 - 126 .
DUNKELMAN O , KELLER N , SHAMIR A . Improved single-key attacks on 8-round AES-192 and AES-256 [J ] . Journal of Cryptology , 2010 , 28 ( 3 ): 158 - 176 .
DERBEZ P , FOUQUE P A , JEAN J . Improved key recovery attacks on reduced-round AES in the single-key setting [J ] . Lecture Notes in Computer Science , 2013 , 788 : 371 - 387 .
LI L B , JIA K T , WANG X Y . Improved single-key attacks on 9-round AES-192/256 [M ] // Fast Software Encryption . Springer Berlin Heidel-berg c 2014 : 127 - 146 .
0
浏览量
1
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构