浏览全部资源
扫码关注微信
西安电子科技大学综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
[ "谢敏(1976- ),女,湖南桃源人,博士,西安电子科技大学副教授,主要研究方向为编码与密码。" ]
[ "田峰(1995- ),男,河南安阳人,西安电子科技大学硕士生,主要研究方向为分组密码算法的分析。" ]
[ "李嘉琪(1993- ),男,陕西榆林人,西安电子科技大学硕士生,主要研究方向为分组密码算法的分析。" ]
网络出版日期:2019-09,
纸质出版日期:2019-09-25
移动端阅览
谢敏, 田峰, 李嘉琪. TWINE算法的相关密钥不可能飞来去器攻击[J]. 通信学报, 2019,40(9):184-192.
Min XIE, Feng TIAN, Jiaqi LI. Related-key impossible boomerang cryptanalysis on TWINE[J]. Journal on communications, 2019, 40(9): 184-192.
谢敏, 田峰, 李嘉琪. TWINE算法的相关密钥不可能飞来去器攻击[J]. 通信学报, 2019,40(9):184-192. DOI: 10.11959/j.issn.1000-436x.2019152.
Min XIE, Feng TIAN, Jiaqi LI. Related-key impossible boomerang cryptanalysis on TWINE[J]. Journal on communications, 2019, 40(9): 184-192. DOI: 10.11959/j.issn.1000-436x.2019152.
为了评估轻量级分组密码算法TWINE的安全性,利用相关密钥不可能飞来去器的方法对其进行了分析。构造了由16轮和17轮两条路径组成的相关密钥不可能飞来去器区分器,并将16轮和17轮的路径向前扩展4轮、向后分别扩展3轮和2轮,完成对23轮TWINE密码算法(80 bit密钥)的攻击。实验结果表明,该攻击的数据复杂度为2<sup>62.05</sup>个明文,时间复杂度为2<sup>70.49</sup>次23轮加密,与现有算法相比有明显优势。
In order to evaluate the security of the lightweight block cipher TWINE
the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher
an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results
the proposed attack has obvious advantages.
HONG D , SUNG J , HONG S , et al . HIGHT:a new block cipher suitable for low-resource device [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . Springer , 2006 : 46 - 59 .
BOGDANOV A , KNUDSEN L R , LEANDER G , et al . PRESENT:an ultra-lightweight block cipher [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . Springer , 2007 : 450 - 466 .
IZADI M , SADEGHIYAN B , SADEGHIAN S S , et al . MIBS:a new lightweight block cipher [C ] // 8th International Conference on Cryptology and Network Security . Springer , 2009 : 334 - 348 .
WU W L , ZHANG L . LBlock:a lightweight block cipher [C ] // 9th International Conference on Applied Cryptography and Network Security . Springer , 2011 : 327 - 344 .
BORGHOFF J , CANTEAUT A , GÜNEYSU T , et al PRINCE - a low-latency block cipher for pervasive computing applications [C ] // 18th International Conference on the Theory and Application of Cryptology and Information Security . Springer , 2012 : 208 - 225 .
SHIBUTANI K , ISODE T , HIWATARI H , et al . Piccolo:an ultra-lightweight blockcipher [C ] // 13th International Workshop on Cryptographic Hardware and Embedded Systems . Springer , 2011 : 342 - 357 .
SUZAKI T , MINEMATSU K , SORIOKA S , et al . TWINE:a lightweight block cipher for multiple platforms [C ] // 19th International Conference on Selected Areas in Cryptography . Springer , 2012 : 339 - 354 .
ZHENG X X , JIA K T . Impossible differential attack on reduced-round TWINE [C ] // 16th International Conference on Information Security and Cryptology . Springer , 2013 : 123 - 143 .
WANG Y F , WU W L . Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE [C ] // 19th Australasian Conference on Information Security and Privacy . Springer , 2014 : 1 - 16 .
COBAN M , KARAKOC F , ÖZKAN B . et al Biclique cryptanalysis of TWINE [C ] // 11th International Conference on Cryptology and Network Security . Springer , 2012 : 43 - 55 .
MOHAMED T , YOUSSEF A . Generalized MitM attacks on full TWINE [J ] . Information Processing Letters , 2016 , 116 ( 2 ): 128 - 135 .
WEI Y C , XU P , RONG Y S . Related-key impossible differential cryptanalysis on lightweight cipher TWINE [J ] . Journal of Ambient Intelligence and Humanized Computing , 2019 , 10 ( 2 ): 509 - 517 .
LU J Q . Cryptanalysis of block cipher [R ] . London:University of London , 2016 .
谢敏 , 牟彦利 . LBlock 算法的相关密钥不可能飞来去器分析 [J ] . 通信学报 , 2017 , 38 ( 5 ): 66 - 71 .
XIE M , MU Y L . Related-key impossible boomerang cryptanalysis on LBlock [J ] . Journal on Communications , 2017 , 38 ( 5 ): 66 - 71 .
BIHAM E . New types of cryptanalytic attacks using related key [J ] . Journal of Cryptology , 1994 , 7 ( 4 ): 229 - 246 .
BIHAM E , BIRUUKOV A , SHAMIR A . Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . Springer , 1999 : 12 - 23 .
WAGNER D , . The boomerang attack [C ] // 6th International Workshop on Fast Software Encryption . Springer , 1999 : 156 - 170 .
陈平 , 廖福成 , 卫宏儒 . 对轻量级密码算法 MIBS 的相关密钥不可能差分攻击 [J ] . 通信学报 , 2014 , 35 ( 2 ): 190 - 193 .
CHEN P , LIAO F C , WEI H R . Related-key impossible differential attack on a lightweight block cipher [J ] . Journal on Communications , 2014 , 35 ( 2 ): 190 - 193 .
MA X S , QIAO K X . Related-key rectangle attack on round-reduced Khudra block cipher [C ] // The 9th International Conference on Network and System Security . Springer , 2015 : 331 - 344 .
SASAKI Y , . Related-key boomerang attacks on full ANU lightweight block cipher [C ] // 16th International Conference on Applied Cryptography and Network Security . Springer , 2018 : 421 - 439 .
0
浏览量
532
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构