Computer Science ›› 2017, Vol. 44 ›› Issue (2): 202-205.doi: 10.11896/j.issn.1002-137X.2017.02.032

Previous Articles     Next Articles

Integral Zero-correlation Cryptanalysis on Zodiac

MA Meng, ZHAO Ya-qun and LIU Qing-cong   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Zodiac algorithm,which was designed by a group of Korean scholars,is a 16-round Feistel-type block cipher.In this paper,the security of Zodiac algorithm was evaluated from the point of integral zero-correlation cryptanalysis for the first time.Two groups of 13-round zero-correlation linear approximations for zodiac were constructed,and the 8-round integral zero-correlation distinguisher of zodiac was given,based on which integral zero-correlation cryptanalysis was made on the full-round Zodiac algorithm,and 144bit round-subkey was restored successfully.It shows that the integral zero-correlation cryptanalysis on the full-round Zodiac-128/192/256 algorithm needs 2120 pairs of chosen plaintext-ciphertext and about 282 full-round Zodiac encryptions,and its time complexity is obviously better than the existing results of integral attack.

Key words: Block cipher,Zodiac,Zero-correlation linear approximation,Integral zero-correlation cryptanalysis

[1] LEE C,JUN K,JUNG M,et al.Zodiac version 1.0 (revised) architecture and specification[EB/OL].[2013-3-20].http://www.kisa.or.kr/seed/index.html.
[2] HONG D,SUNG J,MORIAI S,et al.Impossible differentialcryptanalysis of Zodiac [C]∥FSE 2001.Springer-Verlag,LNCS 2355,2002:300-311.
[3] SHAKIBA M,DAKHILALIAN M, MALA H.An improved impossible differential cryptanalysis of Zodiac [J].The Journal of Systems and Software,2010,83(3):702-709.
[4] SUN B,ZHANG P,LI C.Impossible differential and integralcryptanalysis of Zodiac[J].Journal of Software,2011,22(8):1911-1917.(in Chinese) 孙兵,张鹏,李超.Zodiac 算法的不可能差分和积分攻击[J].软件学报,2011,22(8):1911-1917.
[5] HAI X,TANG X H,LI C.The meet-in-the-middle attacks onZodiac[J].Journal of Electronics & Information Technology,2012,34(9):2259-2262.(in Chinese) 海昕,唐学海,李超.对Zodiac算法的中间相遇攻击[J].电子与信息学报,2012,34(9):2259-2262.
[6] LIU Q,WEI H R,PAN W.Collision attack on Zodiac algorithm[J].Journal of Computer Applications,2014,34(1):73-77.(in Chinese) 刘青,卫宏儒,潘伟.Zodiac算法的碰撞攻击[J].计算机应用,2014,34(1):73-77.
[7] BOGDANOV A,LEANDER G,N YBERG K,et al.Integral and multidimensional linear distinguishers with correlation zero[C]∥Advances in Cryptology(ASIACRYPT 2012).Springer Berlin Heidelberg,2012:244-261.
[8] BOGDANOV A,RIJMEN V.Linear hulls with correlation zero and linear cryptanalysis of block ciphers[J].Designs,Codes and Cryptography,2014,70(3):369-383.
[9] LUO F,ZHOU X G,OU Q Y.Mutiple Zero-correlation Linear Cryptanalysis[J].Journal of Xi’an Electronic and Science University,2014,41(5):196-202.(in Chinese) 罗芳,周学广,欧庆于.对LBlock 算法的多重零相关线性分析[J].西安电子科技大学学报,2014,41(5):196-202.
[10] WANG M Q,WEN L.Research on zero-correlation linear cryptanalysis[J].Journal of Cryptologic Research,2014,1(3):296-310.(in Chinese) 王美琴,温隆.零相关线性分析研究[J].密码学报,2014,1(3):296-310 .
[11] YI W T,CHEN S Z.Multidimensional zero-correlation linear attacks on Fox block cipher[J].Journal of Cryptologic Research,2015,2(1):27-39.(in Chinese) 伊文坛,陈少真.Fox 密码的多维零相关线性分析[J].密码学报,2015,2(1):27-39.
[12] JIN C H.Spectra characterizations of nonsingular feedback polynomials over finite fields and residue class rings[J].Journal of China Institute of Communications,2000,1(1):74-77.(in Chinese) 金晨辉.有限域和剩余类环上非奇异反馈多项式的谱刻划[J].通信学报,2000,21(1):74-77.
[13] ZHANG P,LI R L,LI C.New square attack on Zodiac[J].Journal of Electronics & Information Technology,2010,32(11):2790-2794.(in Chinese) 张鹏,李瑞林,李超.Zodiac算法新的Square攻击[J].电子与信息学报,2010,32(11):2790-2794.
[14] LI C,WEI Y C.New impossible differential cryptanalysis of Zodiac[J].Journal of National University of Defense Technology,2012,34(5):132-136.(in Chinese) 李超,魏悦川.Zodiac算法新的不可能差分攻击[J].国防科技大学学报,2012,34(5):132-136.
[15] HONG D,SUNG J,MORIAI S,et al.Impossible differentialcryptanalysis of Zodiac[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computers,2002,5(1):38-43.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .