计算机科学 ›› 2014, Vol. 41 ›› Issue (Z6): 352-356.

• 信息安全 • 上一篇    下一篇

CLEFIA算法的不可能差分密码分析

殷广丽,卫宏儒   

  1. 北京科技大学数理学院 北京100083;北京科技大学数理学院 北京100083
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受2013年国家自然科学基金(61272476)和内蒙古自治区科技创新引导奖励资金(2012)资助

Impossible Differential Cryptanalysis of CLEFIA

YIN Guang-li and WEI Hong-ru   

  • Online:2018-11-14 Published:2018-11-14

摘要: 为研究分组密码CLEFIA抵抗不可能差分攻击的能力,使用了两类9轮不可能差分路径,给出了相关攻击结果。基于一条9轮不可能差分路径,利用轮函数中S盒差分分布表恢复密钥,攻击了11轮的CLEFIA。改进了关于14轮的CLEFIA-256的不可能差分攻击的结果,将数据复杂度降低到2104.23,时间复杂度降低到2221.5。同时,在两条不可能差分的基础上,根据轮密钥之间的关系,使用Early-abort技术和S盒差分分布表,分别给出12轮CLEFIA-128和13轮CLEFIA-128的不可能差分攻击。

关键词: 分组密码,CLEFIA,不可能差分,S盒,Early-abort技术 中图法分类号TN918.1文献标识码A

Abstract: To analyze impossible differential cryptanalysis on the block cipher CLEFIA,the results are presented based on two 9-round impossible differential role.It uses the output and input differences of S-boxes to recover round keys,which apply one impossible differential attack to 11-round reduced CLEFIA.Improved result on 14round CLEFFIA-256is given with the number of chosen plaintexts being reduced to 2104.23and the time complexity reduced to 2221.5.At the same time,exploiting the key relations,using Early -Abort technique and S-boxes differential technique,impossible differential attack is proposed on 12and 13-round CLEFIA-128based on two impossible differential roles respectively.

Key words: Block cipher,CLEFIA,Impossible differential attack,S-box,Early-abort technique

[1] Biham E,Biryukov A,Shamir A.Cryptanalysis of Skipjackreduced to 31rounds using impossible differentials[C]∥ Jacques Stern.Advances in ryptology-Eurocrypt’99.Czech Republic:Springer Berlin Heidelberg,1999:12-23
[2] Sony Corporation.The 128-bit Block cipher CLEFIA:Security and Performance Evaluations,Revision 1.0[R].Tokyo:Sony Corporation,2007
[3] Shirai T,Shibutani K,Akishita T,et al.The 128-bit block cipher CLEFIA[C]∥Alex Biryukov.FSE 2007,LNCS 4593,Luxembourg:Springer Berlin Heidelberg,2007:181-195
[4] 王薇.分组密码CLEFIA与基于四圈AES的消息认证码的安全性分析[D].济南:山东大学,2009
[5] Tsunoo Y,Tsujihara E,Shigeri M,et al.Impossible differential Cryptanalysis of CLEFA[C]∥Kaisa Nyberg.FSE 2008,LNCS 5086.Lausanne,Switzerland:Springer Berlin Heidelberg,2008:398-411
[6] 孙兵.分组密码的分析方法及应用研究[D].长沙:国防科学技术大学,2009
[7] Tang X,Sun B,Li R,et al.Impossible differential cryptanalysis of 13-round CLEFIA-128[J].Journal of Systems and Software,2011,84(7):1191-1196
[8] Mala H,Dakhilalian M,Shakiba M.Impossible differential attacks on 13-round CLEFIA-128[J].Journal of Computer Science and Technology,2011,26(4):744-750
[9] 吴文玲,张文涛.分组密码的设计与分析[M].北京:清华大学出版社,2009:68-72
[10] 刘青,卫宏儒.对完整轮数ARIRANG加密模式的新的相关密钥矩形攻击[J].计算机科学,2013,40(8):109-114

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!