幾類高強(qiáng)度密碼S盒的安全性新分析
發(fā)布時(shí)間:2018-08-06 12:02
【摘要】:針對(duì)幾類高強(qiáng)度密碼S盒是否存在新的安全性漏洞問題,提出了一種求解S盒非線性不變函數(shù)的算法。該算法主要基于密碼S盒輸入和輸出的代數(shù)關(guān)系來設(shè)計(jì)。利用該算法對(duì)這幾類密碼S盒進(jìn)行測試,發(fā)現(xiàn)其中幾類存在相同的非線性不變函數(shù);此外,如果將這些S盒使用于分組密碼Midori-64的非線性部件上,將會(huì)得到一個(gè)新的變體算法。利用非線性不變攻擊對(duì)其進(jìn)行安全性分析,結(jié)果表明:該Midori-64變體算法存在嚴(yán)重的安全漏洞,即在非線性不變攻擊下,存在2~(64)個(gè)弱密鑰,并且攻擊所需的數(shù)據(jù)、時(shí)間及存儲(chǔ)復(fù)雜度可忽略不計(jì),因此這幾類高強(qiáng)度密碼S盒存在新的安全缺陷。
[Abstract]:A new algorithm for solving the nonlinear invariant function of S-box is proposed to solve the problem of whether there are new security holes in some kinds of high-strength S-boxes. The algorithm is mainly based on the algebraic relation between the input and output of the cipher S-box. The algorithm is used to test these S-boxes, and it is found that some of them have the same nonlinear invariant functions. In addition, if these S-boxes are applied to the nonlinear components of block cipher Midori-64, a new variant algorithm will be obtained. The security of the algorithm is analyzed by using nonlinear invariant attack. The results show that the Midori-64 variant algorithm has serious security vulnerabilities, that is, there are 2 ~ (64) weak keys in the nonlinear invariant attack and the data needed for the attack. The time and storage complexity are negligible, so these kinds of high strength cipher S-boxes have new security defects.
【作者單位】: 桂林電子科技大學(xué)廣西密碼學(xué)與信息安全重點(diǎn)實(shí)驗(yàn)室;桂林電子科技大學(xué)廣西云計(jì)算與大數(shù)據(jù)協(xié)同創(chuàng)新中心;桂林電子科技大學(xué)廣西無線寬帶通信與信號(hào)處理重點(diǎn)實(shí)驗(yàn)室;
【基金】:國家自然科學(xué)基金資助項(xiàng)目(61572148) 廣西自然科學(xué)基金(杰出青年基金)資助項(xiàng)目(2015GXNSFGA139007) 廣西高等學(xué)校優(yōu)秀中青年骨干教師培養(yǎng)工程項(xiàng)目(第2期)~~
【分類號(hào)】:TN918.1
本文編號(hào):2167673
[Abstract]:A new algorithm for solving the nonlinear invariant function of S-box is proposed to solve the problem of whether there are new security holes in some kinds of high-strength S-boxes. The algorithm is mainly based on the algebraic relation between the input and output of the cipher S-box. The algorithm is used to test these S-boxes, and it is found that some of them have the same nonlinear invariant functions. In addition, if these S-boxes are applied to the nonlinear components of block cipher Midori-64, a new variant algorithm will be obtained. The security of the algorithm is analyzed by using nonlinear invariant attack. The results show that the Midori-64 variant algorithm has serious security vulnerabilities, that is, there are 2 ~ (64) weak keys in the nonlinear invariant attack and the data needed for the attack. The time and storage complexity are negligible, so these kinds of high strength cipher S-boxes have new security defects.
【作者單位】: 桂林電子科技大學(xué)廣西密碼學(xué)與信息安全重點(diǎn)實(shí)驗(yàn)室;桂林電子科技大學(xué)廣西云計(jì)算與大數(shù)據(jù)協(xié)同創(chuàng)新中心;桂林電子科技大學(xué)廣西無線寬帶通信與信號(hào)處理重點(diǎn)實(shí)驗(yàn)室;
【基金】:國家自然科學(xué)基金資助項(xiàng)目(61572148) 廣西自然科學(xué)基金(杰出青年基金)資助項(xiàng)目(2015GXNSFGA139007) 廣西高等學(xué)校優(yōu)秀中青年骨干教師培養(yǎng)工程項(xiàng)目(第2期)~~
【分類號(hào)】:TN918.1
【相似文獻(xiàn)】
相關(guān)期刊論文 前6條
1 胡朝浪;胡勇;任德斌;楊勇;夏天;吳榮軍;;某類一維連續(xù)混沌映射的弱密鑰的研究[J];四川大學(xué)學(xué)報(bào)(自然科學(xué)版);2008年03期
2 尹汝明;袁堅(jiān);山秀明;王希勤;;混沌密碼系統(tǒng)弱密鑰隨機(jī)性分析[J];中國科學(xué):信息科學(xué);2011年07期
3 孫曉玲;王美琴;孫旭光;李忠;李?yuàn)檴?楊秋格;梁峰;;16輪Blow-CAST-Fish的弱密鑰攻擊[J];計(jì)算機(jī)工程與應(yīng)用;2011年35期
4 王育民;;DES的弱密鑰的代數(shù)構(gòu)造[J];西安電子科技大學(xué)學(xué)報(bào);1989年04期
5 侯宇;;SAFER-64的弱密鑰[J];中國計(jì)量學(xué)院學(xué)報(bào);2007年01期
6 董慶寬,傅曉彤,肖國鎮(zhèn);對(duì)大整數(shù)n=pq分解的一個(gè)有效的搜索算法[J];電子學(xué)報(bào);2001年10期
相關(guān)博士學(xué)位論文 前1條
1 張海納;eSTREAM序列密碼候選算法的安全性分析[D];山東大學(xué);2009年
相關(guān)碩士學(xué)位論文 前1條
1 戴振利;分組密碼算法的Linear Hull的研究[D];山東大學(xué);2010年
,本文編號(hào):2167673
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2167673.html
最近更新
教材專著