首页 | 本学科首页   官方微博 | 高级检索  
     

分组密码TWINE的中间相遇攻击
引用本文:汪艳凤,吴文玲.分组密码TWINE的中间相遇攻击[J].软件学报,2015,26(10):2684-2695.
作者姓名:汪艳凤  吴文玲
作者单位:中国科学院 软件研究所 可信计算与信息保障实验室, 北京 100190;中国科学院 研究生院, 北京 100049,中国科学院 软件研究所 可信计算与信息保障实验室, 北京 100190
基金项目:国家重点基础研究发展计划(973)(2013CB338002);国家自然科学基金(61272476,61232009,61202420)
摘    要:将Biclique初始结构与标准的三子集中间相遇攻击相结合,给出了一种普遍的中间相遇攻击模式.与Biclique分析相比,该模式下的攻击作为算法抗中间相遇攻击的结果更为合理.进一步地,评估了算法TWINE抗中间相遇攻击的能力,通过合理选择中立比特位置以及部分匹配位置,给出了18轮TWINE-80以及22轮TWINE-128算法的中间相遇攻击结果.到目前为止,这是TWINE算法分析中数据复杂度最小的攻击结果.

关 键 词:分组密码  TWINE  中间相遇攻击  Biclique  数据复杂度
收稿时间:9/2/2013 12:00:00 AM
修稿时间:2014/10/23 0:00:00

Meet-in-the-Middle Attack on TWINE Block Cipher
WANG Yan-Feng and WU Wen-Ling.Meet-in-the-Middle Attack on TWINE Block Cipher[J].Journal of Software,2015,26(10):2684-2695.
Authors:WANG Yan-Feng and WU Wen-Ling
Affiliation:Trusted Computing and Information Assurance Laboratory, Institute of Software, The Chinese Academy of Sciences, Beijing 100190, China;Graduate University, The Chinese Academy of Sciences, Beijing 100049, China and Trusted Computing and Information Assurance Laboratory, Institute of Software, The Chinese Academy of Sciences, Beijing 100190, China
Abstract:This paper presents a general structure of meet-in-the-middle attack by combing the advantages of Biclique and three sub-set meet-in- the-middle. Compared with the Biclique cryptanalysis proposed in Asiacrypt 2011, this attack model is more reasonable to be regarded as the security of one block cipher against meet-in-the-middle attack. Moreover, the study evaluates the security of TWINE against meet-in-the- middle attack and gives attacks on 18-round TWINE-80 and 22-round TWINE-128. Meanwhile, the data complexities of these attacks are the least among the precious attacks on TWINE.
Keywords:block cipher  TWINE  meet-in-the-middle  Biclique  data complexity
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号