期刊文献+

Piccolo算法的Biclique分析

Biclique Cryptanalysis of Piccolo
在线阅读 下载PDF
导出
摘要 Piccolo算法作为一种硬件实现极为高效的轻量级分组密码算法,对其的安全性评估一直是学术界研究的热点.本文中基于Biclique攻击的思想,结合算法轮函数结构和密钥扩展方面的性质,利用非平衡Biclique攻击和Stars攻击两种方法对Piccolo-80和Piccolo-128算法分别进行了安全性分析.其中,对于Piccolo-80算法,进行非平衡Biclique攻击所需的数据复杂度、存储复杂度以及计算复杂度分别为2^(36)、2^(11.12)和2^(79.03);进行Stars攻击所需的数据复杂度、存储复杂度以及计算复杂度分别为2、2^(8.12)和2^(79.31).对于Piccolo-128算法的这两种攻击分别所需的数据复杂度为2^(20)、2,存储复杂度为2^(11.17)、2^(8.19),计算复杂度为2^(127.05)、2^(127.40).与现有的攻击结果相比,增加考虑了存储复杂度,且在数据复杂度和计算复杂度方面均有一定的优化. The lightweight block cipher Piccolo is very efficient for hardware implementation,and its security evaluation has been a hot topic in academia.Based on the idea of biclique attack,combined with the properties of the round function and the key schedule of Piccolo,this paper analyzes the security of Piccolo-80 and Piccolo-128 with unbalanced biclique attack and stars attack.For the unbalanced biclique attack of Piccolo-80,the required data complexity is 236,memory complexity is 211.12,and computational complexity is 279.03.For the Stars attack of Piccolo-80,the required data complexity is 2,memory complexity is 28.12 and computational complexity is 279.31.For the two attacks of Piccolo-128,the required data complexities are 220 and 2,memory complexities are 211.17 and 28.19,and computational complexities are 2127.05 and 2127.40,respectively.Compared with the existing attacks,this study takes into consideration of the memory complexity,and makes some optimization in terms of data complexity and computational complexity.
作者 徐林宏 郭建胜 崔竞一 李明明 XU Lin-Hong;GUO Jian-Sheng;CUI Jing-Yi;LI Ming-Ming(Information Engineering University,Zhengzhou 450001,China)
机构地区 信息工程大学
出处 《密码学报》 CSCD 2019年第2期150-164,共15页 Journal of Cryptologic Research
基金 信息保障技术重点实验室开放基金(KJ-17-003)~~
关键词 轻量级分组密码 Piccolo算法 密码分析 Biclique分析 Stars攻击 lightweight block cipher Piccolo cryptanalysis Biclique analysis Stars attack
作者简介 通信作者:郭建胜,郭建胜(1972–),河南沁阳人,教授,博士生导师.主要研究领域为信息安全与密码学.tsg_31@126.com;徐林宏(1995–),江苏盐城人,硕士在读.主要研究领域为分组密码的设计与分析.xlh_right@126.com;崔竞一(1992–),河南郑州人,博士在读.主要研究领域为分组密码设计与分析.xd_cjy@126.com;李明明(1995–),湖南衡阳人,硕士在读.主要研究领域为分组密码的设计与分析.18203622214@163.com
  • 相关文献

参考文献5

二级参考文献53

  • 1Juels A, Weis S A. Authenticating pervasive devices withhuman protocols//Proceedings of the Advances in Cryptology(CRYPTO 2005). Santa Barbara, California, USA, 2005:293-198.
  • 2Bogdanov A, et al. Hash functions and RFID tags: Mind thegap//Proceedings of the Cryptographic Hardware andEmbedded Systems(CHES 2008). Washington DC,USA,2008: 283-299.
  • 3Moradi A,et al. Pushing the limits: A very compact and athreshold implementation of AES//Proceedings of theAdvances in Cryptology-EUROCRYPT 2011. Tallinn, Estonia,2011: 69-88.
  • 4Bogdanov A, et al. PRESENT: An ultra-lightweight blockcipher//Proceedings of the Cryptographic Hardware andEmbedded Systems(CHES 2007). Vienna, Austria, 2007:450-466.
  • 5Nakahara J, Rijmen Jr V, Preneel B,et al. The MESHblock ciphers//Proceedings of the 4th International Work-shop on Information Security Applications(WISA 2003).Jeju Island,Korea, 2003: 458-473.
  • 6Nakahara J Jr. Fast variants of the MESH block ciphers//Proceedings of the 5 th International Conference on Cryptolo-gy in India(Indocrypt 2004). Chennai, India, 2004: 162-174.
  • 7Wu W, Zhang L. LBlock: A lightweight block cipher//Proceedings of the 9 th International Conference on AppliedCryptography and Network Security(ACNS 2011). Nerja(Malaga),Spain, 2011: 327-344.
  • 8Gong Z.,Nikova S,Law Y. KLEIN: A new family of light-weight block ciphers//Proceedings of the 7th Workshop onRFID Security and Privacy(RFIDSec 2011).Amherst,Massachusetts, USA, 2011: 1-18.
  • 9Wang M. Differential cryptanalysis of reduced-round PRES-ENT/ /Proceedings of the 1st International Conference onCryptology in Africa(AFRICACRYPT 2008). Casablanca,Morocco, 2008: 40-49.
  • 10Collard B, Standaert F X. A statistical saturation attack? against the block cipher PRESENT//Proceedings of theTopics in Cryptology(CT-RSA 2009). San Francisco, CA,USA, 2009: 95-210.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部