首页 | 本学科首页   官方微博 | 高级检索  
     

CIKS-128分组算法的相关密钥-差分攻击
引用本文:郭建胜,崔竞一,罗伟,刘翼鹏.CIKS-128分组算法的相关密钥-差分攻击[J].电子学报,2016,44(8):1837-1844.
作者姓名:郭建胜  崔竞一  罗伟  刘翼鹏
作者单位:1. 解放军信息工程大学, 河南郑州 450004;2. 信息保障技术重点实验室, 北京 100000;3. 7817部队, 四川成都 611843
基金项目:博士后科学基金(2014M562582)
摘    要:分析研究了CIKS-128分组密码算法在相关密钥-差分攻击下的安全性.利用DDP结构和非线性函数的差分信息泄漏规律构造了一条高概率相关密钥-差分特征,并给出攻击算法,恢复出了192bit密钥;在此基础上,对剩余64bit密钥进行穷举攻击,恢复出了算法的全部256bit密钥.攻击所需的计算复杂度为277次CIKS-128算法加密,数据复杂度为277个相关密钥-选择明文,存储复杂度为225.4字节存储空间.分析结果表明,CIKS-128算法在相关密钥-差分攻击条件下是不安全的.

关 键 词:分组密码  密码分析  CIKS-128分组算法  相关密钥-差分攻击  
收稿时间:2014-12-24

Related-Key Differential Attack on Block Cipher CIKS-128
GUO Jian-sheng,CUI Jing-yi,LUO Wei,LIU Yi-peng.Related-Key Differential Attack on Block Cipher CIKS-128[J].Acta Electronica Sinica,2016,44(8):1837-1844.
Authors:GUO Jian-sheng  CUI Jing-yi  LUO Wei  LIU Yi-peng
Affiliation:1. The PLA Information Engineering University, Zhengzhou, Henan 450004, China;2. Science and Technology on Information Assurance Laboratory, Beijing 100000, China;3. The Unit of 78179, Chengdu, Sichuan, 611843, China
Abstract:The security of CIKS-128 block cipher under related-key differential attack was studied.A related-key dif-ferential of high probability was constructed with the differential information leakages in the structure of DDPs and nonlinear functions.By proposing a corresponding key recovery attack based on the related-key differential,the master key of 192 bits was recovered.The rest 64 bits of the master key could be obtained by exhaustive search.The computational complexity,the data complexity and the memory complexity are 277 CIKS-128 block cipher encryptions,277 chosen-plaintexts and 225.4 bytes of storage resources,respectively.Analysis results show that CIKS-128 is unsafe under related-key differential attack.
Keywords:block cipher  cryptanalysis  CIKS-128  related-key differential attack
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号