计算机科学 ›› 2024, Vol. 51 ›› Issue (2): 378-386.doi: 10.11896/jsjkx.230900112
• 信息安全 • 上一篇
李征, 李曼曼, 陈少真
LI Zheng, LI Manman, CHEN Shaozhen
摘要: Deoxys-BC密码算法是在2014年亚密会上发布的一种轻量级可调分组密码算法,该算法的设计采用SPN结构和TWEAK框架。通过研究Deoxys-BC密码算法的内部特征与密钥扩展的特点,利用控制调柄差分的方法,并结合差分枚举技术和轮密钥调柄差分叠加消除特性,构造6轮Deoxys-BC-256和7轮Deoxys-BC-384的中间相遇区分器。利用此区分器,通过减少猜测的字节量,来达到降低复杂度的效果,改进了9轮Deoxys-BC-256和11轮Deoxys-BC-384中间相遇攻击的结果。相比Deoxys-BC系列密码算法现有的中间相遇攻击结果,该攻击的时间复杂度和存储复杂度均大幅下降。
中图分类号:
[1]JEAN J,NIKOLIC I,PEYRIN T.Tweaks and Keys for Block Ciphers:The TWEAKEY Framework [C]//ASIACRYPT 2014,PART II,LNCS 8874.2014:274-288. [2]BERNSTEIN D J.Caesar:Competition for authenticated encryption:Security,applicability,and robustness[S].2014. [3]DERBEZ P,FOUQUE P.Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES[C]//FSE 2013,LNCS 8424.2014,541-560. [4]LI R J,JIN C H.Meet-in-the-middle attacks on round-reducedtweakable block cipher Deoxys-BC[J].IET Inf.Secur.,2019,13:70-75. [5]LIU Y,SHI B,GU D.Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256[J].The Computer Journal,2020,63(12):1859-1870. [6]LI M M,CHEN S Z.Improved meet-in-the-middle attacks on re-duced-round tweakable block cipher Deoxys-BC[J].The Computer Journal,2022,65(9):2411-2420. [7]FIPS PUB 197.Specification for Advanced Encryption Standard[S].Washington D.C.:National Institute of Standards and Technology,2001. [8]BEIERLE C,JEAN J,KOLBL S.The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS [C]//CRYPTO 2016,PART II,LNCS 9815.2016:123-153. [9]BANIK S,BOGDANOV A,ISOBE T.MIDORI:A Block Cipher for Low Energy[C]//ASIACRYPT 2015,PART II,LNCS 9453.2015:411-436. [10]DIFFIE W,HELLMAN M.Exhaustive Cryptanalysis of theNBS Data Encryption Standard[J].Computer,1977,10(6):74-84. [11]DEMIRCI H,SELCUK A A.A Meet-in-the-Middle Attack on8-Round AES[C]//Fast Software Encryption-FSE’08,LNCS5086.Springer-Verlag,2008:116-126. [12]DUNKELMAN O,KELLER N,SHAMIR A.Improved Single-Key Attacks on 8-Round AES-192 and AES-256[C]//ASIACRYPT’10.LNCS 6477,Springer-Verlag 2010:158-176. [13]LV Y,SHI D,GUO Y.Automatic Demirci-Selçuk Meet-In-The-Middle Attack On SIMON[J].The Computer Journal,2023,12:3052-3068. [14]SHI D,SUN S,SONG L.Exploiting non-full key additions:Full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptana-lysis of SKINNY[C]//Advances in Cryptology-EUROCRYPT 2023.Lyon,France,Springer,2023:67-97. [15]HUA J,DONG X,SUN S.Improved MITM cryptanalysis on Streebog[J].IACR Trans.Symmetric Cryptol,2022(2022):63-91. [16]BOURA C,DAVID N,DERBEZ P.Differential meet-in-the-middle cryptanalysis[C]//Annual International Cryptology Confe-rence.Cham:Springe,2023:240-272. [17]LI M M,CHEN S Z.Improved meet-in-the-middle attacks on reduced-round Kiasu-BC algorithm[J].Journal on Communications,2022,43(7):41-48. [18]LIU Y,SHI Y,GU D.Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC[J].The Computer Journal,2019,62(12):1761-1776. [19]ZONG R,DONG X.MILP-aided Related-Tweak/Key Impossible Differential Attack and Its Applications to QARMA,Joltik-BC[J].IEEE Access,2019,7:1-1. [20]KANDA M.Practical security evaluation against differential and linear cryptanalyses for Feistel ciphers with SPN round function[C]//Selected Areas in Cryptography.Berlin:Springer,2001:168-179. [21]LI M M,CHEN S Z.Improved meet-in-the-middle attacks on reduced-round Joltik-BC[J].IET Information Security,2021:15:247-255. |
|