基于中間相遇攻擊方法的分組密碼分析研究
發(fā)布時間:2019-01-10 21:52
【摘要】:20世紀以來,隨著計算機技術(shù)、通信技術(shù)、互聯(lián)網(wǎng)技術(shù)的突飛猛進和電子商務(wù)、網(wǎng)上銀行等的興起,信息安全受到越來越廣泛的關(guān)注,同時隨著物聯(lián)網(wǎng)、無線傳感器、RFID標簽的出現(xiàn),分組密碼設(shè)計和分析技術(shù)高速發(fā)展,尤其是在輕量級分組方面的發(fā)展更為迅速,密碼學(xué)在信息安全領(lǐng)域越來越重要,于是,近年來提出了許多適用于資源受限環(huán)境下的輕量級分組密碼算法,例如LBLOCK,PRESENT,KATAN及KTANTAN,SIMON及SIPECK等等。本文主要對LBLOCK算法及KATAN和KTANTAN算法進行分析,LBLOCK算法是吳文玲和張蕾提出的基于Feistel結(jié)構(gòu)的主密鑰為80比特的輕量級分組密碼,KATAN和KTANTAN算法是Christophe De Cannière和Orr Dunkelman采用流密碼中常用的非線性移位寄存器而設(shè)計的輕量級分組密碼。同時,與密碼設(shè)計相對應(yīng)的密碼分析學(xué)的發(fā)展也十分迅速。最常用于分析分組密碼的兩種方法是差分分析和線性分析。本文使用Diffie和Hellman提出的中間相遇攻擊方法對LBLOCK算法進行安全性分析,使用代數(shù)方法對KATAN和KTANTAN算法中間相遇攻擊的中間匹配階段進行分析。本文主要做了以下幾方面的工作:1本文開始對密碼學(xué)的發(fā)展歷程做了簡要介紹,對密碼設(shè)計和密碼分析相互對立相互促進有了新的認識,隨著技術(shù)的更新,對密碼學(xué)提出了新的要求,隨之新的加密方法陸續(xù)提出,與此同時,密碼分析學(xué)的發(fā)展齊頭并進,新的分析方法不斷涌現(xiàn)。對分組密碼的兩種結(jié)構(gòu)Feistel結(jié)構(gòu)和SP結(jié)構(gòu)做了詳細介紹。2對中間相遇攻擊方法進行了詳細介紹,其本質(zhì)是將一個完整的復(fù)雜算法,劃分為兩個連續(xù)的部分,向前加密部分和向后解密部分,并對這兩部分單獨進行安全性分析,然后在中間某一輪進行中間匹配過程,如果兩個部分能夠匹配,則所猜測的密碼為候選密鑰,否則,猜測的密鑰是錯誤密鑰,予以篩除。3對LBLOCK算法進行中間相遇攻擊,發(fā)現(xiàn)其算法本身因為基于擴散性較低的Feistel結(jié)構(gòu),所以算法的擴散性也比較低。雖然密鑰編排中循環(huán)左移29比特破壞了移位后的對稱性,而且每三輪主密鑰就全部調(diào)用一次,密鑰編排擴散性較高。因此本文對LBLOCK算法的中間相遇攻擊輪數(shù)僅達到9輪,在使用了剪切-拼接技術(shù)以后擴展到10輪。4在對KTANTAN32算法的密鑰編排分析,發(fā)現(xiàn)其對主密鑰的調(diào)用并不均勻,有些比特的主密鑰在100輪之后才被初次使用,很適合使用中間相遇攻擊進行分析,再對KTANTAN32算法的中間相遇攻擊中的中間匹配階段使用單密鑰代數(shù)分析方法進行間接匹配,達到降低其復(fù)雜性,增加了匹配的位數(shù)。
[Abstract]:Since the 20th century, with the rapid development of computer technology, communication technology, Internet technology and the rise of electronic commerce and online banking, information security has been paid more and more attention. At the same time, with the Internet of things, wireless sensors, With the emergence of RFID tags and the rapid development of block cipher design and analysis technology, especially in lightweight block, cryptography is becoming more and more important in the field of information security. In recent years, many lightweight block cipher algorithms, such as LBLOCK,PRESENT,KATAN, KTANTAN,SIMON and SIPECK, have been proposed for resource constrained environments. This paper mainly analyzes the LBLOCK algorithm and the KATAN and KTANTAN algorithms. The LBLOCK algorithm is a lightweight block cipher with 80 bits master key based on Feistel structure proposed by Wu Wenling and Zhang Lei. KATAN and KTANTAN algorithms are lightweight block ciphers designed by Christophe De Canni 貓 re and Orr Dunkelman using nonlinear shift registers commonly used in stream ciphers. At the same time, the development of cryptography corresponding to cryptographic design is very rapid. The two most commonly used methods to analyze block ciphers are differential analysis and linear analysis. In this paper, the security of LBLOCK algorithm is analyzed by using the middle encounter attack method proposed by Diffie and Hellman, and the intermediate matching stage of KATAN and KTANTAN algorithm is analyzed by algebraic method. The main work of this paper is as follows: 1 this paper begins with a brief introduction to the development of cryptography, and has a new understanding of the opposition and mutual promotion of cryptography design and cryptography analysis, with the updating of technology. At the same time, the development of cryptography is in step with the development of cryptography, and new methods of analysis are emerging. In this paper, two kinds of Feistel structure and SP structure of block cipher are introduced in detail. 2 the middle encounter attack method is introduced in detail. In essence, a complete complex algorithm is divided into two consecutive parts. The forward encryption part and the backward decryption part are analyzed separately, and then the intermediate matching process is carried out in the middle round. If the two parts can match, the password is a candidate key, otherwise, The speculated key is the wrong key, and the middle encounter attack of the LBLOCK algorithm is eliminated. It is found that the algorithm itself is based on the low diffusivity of the Feistel structure, so the diffusivity of the algorithm is also relatively low. Although the shift of 29 bits to the left in key choreography breaks the symmetry after shift, and every three rounds of master keys are called once, the diffusion of key choreography is high. Therefore, in this paper, the number of intermediate encounter attack rounds of LBLOCK algorithm is only 9 rounds, which is extended to 10 rounds after using shear-splicing technology. 4 the key arrangement analysis of KTANTAN32 algorithm shows that the calling of master key is not uniform. The master key of some bits is first used after 100 rounds, so it is very suitable to use the intermediate encounter attack to analyze, and then use the single-secret key algebra analysis method to indirectly match the intermediate matching phase of the middle encounter attack of KTANTAN32 algorithm. To reduce its complexity and increase the number of matching bits.
【學(xué)位授予單位】:山東師范大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2016
【分類號】:TP309
,
本文編號:2406823
[Abstract]:Since the 20th century, with the rapid development of computer technology, communication technology, Internet technology and the rise of electronic commerce and online banking, information security has been paid more and more attention. At the same time, with the Internet of things, wireless sensors, With the emergence of RFID tags and the rapid development of block cipher design and analysis technology, especially in lightweight block, cryptography is becoming more and more important in the field of information security. In recent years, many lightweight block cipher algorithms, such as LBLOCK,PRESENT,KATAN, KTANTAN,SIMON and SIPECK, have been proposed for resource constrained environments. This paper mainly analyzes the LBLOCK algorithm and the KATAN and KTANTAN algorithms. The LBLOCK algorithm is a lightweight block cipher with 80 bits master key based on Feistel structure proposed by Wu Wenling and Zhang Lei. KATAN and KTANTAN algorithms are lightweight block ciphers designed by Christophe De Canni 貓 re and Orr Dunkelman using nonlinear shift registers commonly used in stream ciphers. At the same time, the development of cryptography corresponding to cryptographic design is very rapid. The two most commonly used methods to analyze block ciphers are differential analysis and linear analysis. In this paper, the security of LBLOCK algorithm is analyzed by using the middle encounter attack method proposed by Diffie and Hellman, and the intermediate matching stage of KATAN and KTANTAN algorithm is analyzed by algebraic method. The main work of this paper is as follows: 1 this paper begins with a brief introduction to the development of cryptography, and has a new understanding of the opposition and mutual promotion of cryptography design and cryptography analysis, with the updating of technology. At the same time, the development of cryptography is in step with the development of cryptography, and new methods of analysis are emerging. In this paper, two kinds of Feistel structure and SP structure of block cipher are introduced in detail. 2 the middle encounter attack method is introduced in detail. In essence, a complete complex algorithm is divided into two consecutive parts. The forward encryption part and the backward decryption part are analyzed separately, and then the intermediate matching process is carried out in the middle round. If the two parts can match, the password is a candidate key, otherwise, The speculated key is the wrong key, and the middle encounter attack of the LBLOCK algorithm is eliminated. It is found that the algorithm itself is based on the low diffusivity of the Feistel structure, so the diffusivity of the algorithm is also relatively low. Although the shift of 29 bits to the left in key choreography breaks the symmetry after shift, and every three rounds of master keys are called once, the diffusion of key choreography is high. Therefore, in this paper, the number of intermediate encounter attack rounds of LBLOCK algorithm is only 9 rounds, which is extended to 10 rounds after using shear-splicing technology. 4 the key arrangement analysis of KTANTAN32 algorithm shows that the calling of master key is not uniform. The master key of some bits is first used after 100 rounds, so it is very suitable to use the intermediate encounter attack to analyze, and then use the single-secret key algebra analysis method to indirectly match the intermediate matching phase of the middle encounter attack of KTANTAN32 algorithm. To reduce its complexity and increase the number of matching bits.
【學(xué)位授予單位】:山東師范大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2016
【分類號】:TP309
,
本文編號:2406823
本文鏈接:http://sikaile.net/jingjilunwen/dianzishangwulunwen/2406823.html
最近更新
教材專著