计算机科学 ›› 2023, Vol. 50 ›› Issue (10): 377-382.doi: 10.11896/jsjkx.220800007
• 信息安全 • 上一篇
徐睿, 彭长根, 许德权
XU Rui, PENG Changgen, XU Dequan
摘要: 针对国密ZUC算法的认证加密的安全性、效率以及轻量化需求,提出了一种类自同步ZUC的关联数据认证加密方案ZUCAE。该方案通过改进祖冲之流密码算法(ZUC-256)的LFSR层算法,设计实现了一种类似自同步流密码的ZUC-SSL算法,利用该算法使密文参与到状态更新函数中,用于认证码的生成。ZUC-256算法进行消息加密,通过优化初始化模块,将关联数据嵌入到初始化过程中,实现了密钥流生成和加密并行进行,解密前进行消息认证,减少计算消耗时间,提高方案的安全性。安全性分析结果表明该算法能够抵抗当前主流的基于LFSR设计的流密码相关攻击,且类自同步流密码的设计能增强认证码的安全性。与AES-CGM和AEGIS的效率实验对比表明,在数据规模大的环境下,所提算法的效率高于AES-CGM,与AEGIS的效率相当,具备一定的实用性。
中图分类号:
[1]BELLARE M,KOHNO T,NAMPREMPRE C.Authenticatedencryption in SSH:Provably fixing the SSH binary packet protocol[C]//Proceedings of the 9th ACM Conference on Compu-ter and Communications Security.2002:1-11. [2]BELLARE M,NAMPREMPRE C.Authenticated encryption:Relations among notions and analysis of thegeneric composition paradigm[J].Journal of Cryptology,2008,21(4):469-491. [3]ROGAWAY P.Authenticated-encryption with associated-data[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security.2002:98-107. [4]DAEMEN J,KITSOS P.The self-synchronizing stream cipher moustique[M]//New Stream Cipher Designs.Berlin:Springer,2008:210-223. [5]TANOUGAST C,WEBER S,MILLERIOUX G,et al.An Fpga implementation of the HME self-synchronizing stream cipher for Enhanced security and performance[C]//Second NASA/ESA Conference on Adaptive Hardware and Systems(AHS 2007).IEEE,2007:110-118. [6]FRQNCQ J,BESSON L,HUYNH P,et al.Non-triangular self-synchronizing stream ciphers[J].IEEE Transactions on Computers,2020,71(1):134-145. [7]WU W L.Research advances on authenticated encryption algorithms[J].Journal of Cryptologic Research,2018,5(1):70-82. [8]ZHANG F,LIANG Z Y,YANG B L,et al.Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition[J].Frontiers of Information Technology &Electronic Engineering,2019,19(12):1475-1499. [9]TURAN M S,MCKAY K,CHANG D,et al.Status report on the second round of the NIST lightweight cryptography stan-dardization process[R].National Institute of Stan-dards and Technology Internal Report,2021. [10]WU H,PRENEEL B.AEGIS:A fast authenticated encryption algorithm[C]//International Conference on Selected Areas in Cryptography.2013:185-201. [11]BOGDANOV A,MENDEL F,REGAZZONI F,et al.ALE:AES-based lightweight authenticated encryption[C]//International Workshop on Fast Software Encryption.2013:447-466. [12]ANDREEVA E,BILGIN B,BOGDANOV A,et al.APE:au-thenticated permutation-based encryption for lightweight cryptography[C]//International Workshop on Fast Software Encryption.2014:168-186. [13]LIU J Y.Applied cryptography[M].Beijing:Tsinghua University Press,2008:165-171. [14]UO J B,ZHANG J.Current situation and development ofstream cipher[J].Journal of Terahertz Science and Electronic Information Technology,2006,4(1):75-80. [15]Design Team.ZUC-256 Stream Cipher[J].Journal of Cryptolo-gic Research,2018,5(2):167-179. [16]FENG X T.ZUC Algorithm:3GPP LTE International Encryption Standard[J].Information Security and Communications Privacy,2011,9(12):45-46. [17]WU H,TAO H,NGUYEN P H,et al.Differential Attacksagainst Stream Cipher ZUC[C]//International Conference on the Theory & Application of Cryptology & Information Security.2012. [18]FENG X T.ZUC stream cipher algorithm[J].Journal of Information Security Research,2016,2(11):1028-1041. [19]TANG Y L,HAN D,YAN X X,et al.Linear distinguishing attack analysis on ZUC stream cipher[J].Journal of Nanjing University of Science and Technology,2016,40(4):450-454. [20]GUAN J,DING L,LIU S K.Guess and determine attack onSNOW3G and ZUC[J].Journal of Software,2013,24(6):1324-1333. [21]WANG Z Y,MAO M,ZHANG Y S.Guess and determine attack on ZUC-256 stream cipher[J].Journal of Computer Applications,2019,39(S1):105-108. [22]DING L,LIU S K,ZHANG Z Y,et al.Guess and determine attack on ZUC based on solvingnonlinear equations[C]//Procee-dings of the 1st International Workshop on ZUC Algorithm.2010. |
|