计算机科学 ›› 2014, Vol. 41 ›› Issue (3): 169-171.

• 软件与数据库技术 • 上一篇    下一篇

SNAKE(2)算法新的Square攻击

郑雅菲,卫宏儒   

  1. 北京科技大学数理学院 北京100083;北京科技大学数理学院 北京100083
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受信息安全国家重点实验室2011年开放课题(02-04-3),内蒙古自治区科技创新引导奖励资金(2012)资助

New Square Attack on SNAKE (2)

ZHENG Ya-fei and WEI Hong-ru   

  • Online:2018-11-14 Published:2018-11-14

摘要: 重新评估了分组密码SNAKE(2)算法抵抗Square攻击的能力。指出文献[4]中给出的基于等价结构的错误5轮Square区分器。综合利用算法原结构与其等价结构,给出了一个新的6轮Square区分器。利用新的区分器,对不同轮数的SNAKE(2)算法应用了Square攻击来恢复部分等价密钥信息,7轮、8轮、9轮SNAKE(2)算法的Square攻击时间复杂度分别为212.19、221.59、230.41次加密运算,数据复杂度分别为29、29.59、210选择明文。攻击结果优于文献[4]中给出的Square攻击。

关键词: SNAKE,Square攻击,区分器,复杂度 中图法分类号TP309文献标识码A

Abstract: The security of block cipher SNAKE (2) against Square attacks was re-evaluated.The wrong 5-round Square distinguisher based on equivalent structure given in paper [4] was pointed out.A new 6-round Square distinguisher based on both the structure of SNAKE (2) and its equivalent structures was proposed.Using the new 6-round Square distinguisher,Square attack was applied to 7,8,9-round SNAKE(2) to recover some information of the equivalent key.The time complexities are 212.19,221.59,230.41 respectively,and the data complexities are 29,29.59,210 respectively.The results are better than the Square attack given by paper[4].

Key words: SNAKE,Square attack,Distinguisher,Complexity

[1] Lee C,Cha Y.The Block Cipher:SNAKE with Provable Resistance against DC and LC attacks 1997[C]∥Proceedings of 1997Korea-Japan Joint Workshop on Information Security and Cryptology (JWISC’97).1997:3-17
[2] Moriai S,Shimoyama T,Kaneko T.Interpolation attacks of the block cipher:SNAKE 1999[J].Lecture Notes in Computer Science, Fast Software Encryption,1999,1636:275-289
[3] Sun B,Qu L,Li C.Impossible Differential Cryptanalysis ofSNAKE-22009[C]∥ International Conference on IEEE Networks Security,Wireless Communications and Trusted Computing,2009.2009,2:63-66
[4] 张鹏,孙兵,李超.对特殊类型Feistel密码的Square攻击[J].国防科技大学学报,2010,32(4):137-140
[5] 魏悦川,孙兵,李超.对简化轮数的SNAKE(2)算法的中间相遇攻击[J].计算机工程与科学,2012,34(6):28-31
[6] Daemen J,Knudsen L R,Rijmen V.The block cipher SQUARE [J]∥Lecture Notes in Computer Science,Fast Software Encryption,1997,1267:149-165
[7] Lei D,Chao L,Feng K.New observation on Camellia [J].Lecture Notes in Computer Science,Selected Areas in Cryptography,2006,3897:51-64
[8] 唐学海,李超,谢端强.CLEFIA密码的Square攻击[J].电子与信息学报,2009,31(9):2260-2263
[9] 王美一,唐学海,李超,等.3D密码的Square攻击[J].电子与信息学报,2010,32(1):157-161
[10] Zhang P,Sun B,Li C.Saturation attack on the block cipher HIGHT[C]∥Proceeding of the 8th International Conference on Crytology and Network Security.2009:76-86
[11] 张鹏,李瑞林,李超.Zodiac算法新的Square攻击[J].电子与信息学报,2010,32(11):2790-2794
[12] 陈华,吴文玲,冯登国.提高S盒非线性度的有效算法[J].计算机科学,2005,32(10):68-70

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!