期刊文献+

轻量级分组密码mCrypton-64的biclique分析

Biclique Cryptanalysis on Light-weight Block Cipher mCrypton-64
在线阅读 下载PDF
导出
摘要 Bogdanov等人在2011年亚密会上提出了一种新的针对分组密码的密钥恢复攻击,称为biclique攻击,该攻击方法在构造biclique结构的基础上结合了中间相遇攻击的思想,可以有效降低攻击的时间复杂度和数据复杂度.此后这一方法被广泛用于分组密码的安全性分析.mCrypton作为一种新的能够在资源有限的硬件环境下高效运行轻量级分组密码,其安全性备受关注.本文首先介绍了biclique攻击的一般方法,并给出了一个d维biclique的完整定义.接着,我们说明了如何通过分析密码的密钥扩展算法,找出两条较短的且相互独立的差分路径,进而完成biclique结构的构造并利用该biclique结构进行全轮攻击.在此基础上,我们给出轻量级分组密码mCrypton-64的算法描述,并利用biclique攻击对其进行分析.mCrypton-64整体采用了SP结构,其分组长度为64比特,密钥长度为64比特,其加密过程包括非线性替换、比特置换、行列换位和密钥加.最后,我们针对mCrypton-64的密钥扩展算法找到了两条相互独立的差分路径,进而构造出一个11~12轮的4维biclique,利用它对全轮mCrypton-64进行了攻击,攻击的数据复杂度为2^(32),计算复杂度为2^(63.115),均好于已有的结果. A new key-recovery attack on block ciphers was proposed by Boganov et al in ASIACRYPT 2011, called biclique attack. This attack can effectively reduce time and data complexity by combining the idea of meet-in-the-middle attack on the basis of constructing biclique structure. Since then, biclique attack has widely been used in the security analysis of block ciphers. mCrypton as a new light-weight block cipher can operate efficiently in hardware environment of limited resources, however its security is a great concern. In this paper, we first introduce a general method of biclique attack and provide a complete definition of d-dimensional biclique. Then, we demonstrate how to construct a biclique and how to attack a full-round block cipher by searching for two short and independent differentials and analyzing the key expansion algorithm of the cipher. Next, we describe the light-weight block cipher mCrypton-64. mCrypton-64 is an SP Network, whose block size and key length are both 64 bits. The encryption function of mCrypton-64 includes 4 operations, they are non-linear substitution, bit permutation, column-to-row transposition and key addition. Last, we construct two independent differentials for mCrypton-64, and construct a 4-dimensional biclique of round 11~12, which is used to attack the full-round mCrypton with data complexity of 2^(32) and computing complexity of 2^(63.115), both of them are better than the current known results.
作者 袁征 李铎
出处 《密码学报》 CSCD 2016年第6期564-572,共9页 Journal of Cryptologic Research
关键词 BICLIQUE mCrypton 轻量级分组密码 biclique mCrypton light-weight block cipher
  • 相关文献

参考文献1

二级参考文献23

  • 1Juels A, Weis S A. Authenticating pervasive devices withhuman protocols//Proceedings of the Advances in Cryptology(CRYPTO 2005). Santa Barbara, California, USA, 2005:293-198.
  • 2Bogdanov A, et al. Hash functions and RFID tags: Mind thegap//Proceedings of the Cryptographic Hardware andEmbedded Systems(CHES 2008). Washington DC,USA,2008: 283-299.
  • 3Moradi A,et al. Pushing the limits: A very compact and athreshold implementation of AES//Proceedings of theAdvances in Cryptology-EUROCRYPT 2011. Tallinn, Estonia,2011: 69-88.
  • 4Bogdanov A, et al. PRESENT: An ultra-lightweight blockcipher//Proceedings of the Cryptographic Hardware andEmbedded Systems(CHES 2007). Vienna, Austria, 2007:450-466.
  • 5Nakahara J, Rijmen Jr V, Preneel B,et al. The MESHblock ciphers//Proceedings of the 4th International Work-shop on Information Security Applications(WISA 2003).Jeju Island,Korea, 2003: 458-473.
  • 6Nakahara J Jr. Fast variants of the MESH block ciphers//Proceedings of the 5 th International Conference on Cryptolo-gy in India(Indocrypt 2004). Chennai, India, 2004: 162-174.
  • 7Wu W, Zhang L. LBlock: A lightweight block cipher//Proceedings of the 9 th International Conference on AppliedCryptography and Network Security(ACNS 2011). Nerja(Malaga),Spain, 2011: 327-344.
  • 8Gong Z.,Nikova S,Law Y. KLEIN: A new family of light-weight block ciphers//Proceedings of the 7th Workshop onRFID Security and Privacy(RFIDSec 2011).Amherst,Massachusetts, USA, 2011: 1-18.
  • 9Wang M. Differential cryptanalysis of reduced-round PRES-ENT/ /Proceedings of the 1st International Conference onCryptology in Africa(AFRICACRYPT 2008). Casablanca,Morocco, 2008: 40-49.
  • 10Collard B, Standaert F X. A statistical saturation attack? against the block cipher PRESENT//Proceedings of theTopics in Cryptology(CT-RSA 2009). San Francisco, CA,USA, 2009: 95-210.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部