首页 | 本学科首页   官方微博 | 高级检索  
     

新的低轮Keccak线性结构设计
引用本文:刘晓强,韦永壮,刘争红. 新的低轮Keccak线性结构设计[J]. 计算机应用, 2018, 38(10): 2934-2939. DOI: 10.11772/j.issn.1001-9081.2018030617
作者姓名:刘晓强  韦永壮  刘争红
作者单位:1. 广西密码学与信息安全重点实验室(桂林电子科技大学), 广西 桂林 541004;2. 广西无线宽带通信与信号处理重点实验室(桂林电子科技大学), 广西 桂林 541004;3. 广西高校云计算与复杂系统重点实验室(桂林电子科技大学), 广西 桂林 541004
基金项目:国家自然科学基金资助项目(61572148);广西无线宽带通信与信号处理重点实验室2016年主任基金资助项目(GXKL06160112)。
摘    要:针对Keccak算法S盒层线性分解的问题,提出一种新的线性结构构造方法,该方法主要基于Keccak算法S盒代数性质。首先,S盒层的输入比特需要固定部分约束条件,以确保状态数据经过这种线性结构仍具有线性关系;然后再结合中间相遇攻击的思想给出新的低轮Keccak算法零和区分器的构造方法。实验结果表明:新的顺1轮、逆1轮零和区分器可以完成目前理论上最好的15轮Keccak的区分攻击,且复杂度降低至2257;新的顺1轮、逆2轮零和区分器具有自由变量更多、区分攻击的组合方式更丰富等优点。

关 键 词:SHA-3  Hash算法  中间相遇  零和区分器  线性结构  
收稿时间:2018-03-26
修稿时间:2018-04-29

New design of linear structure for round-reduced Keccak
LIU Xiaoqiang,WEI Yongzhuang,LIU Zhenghong. New design of linear structure for round-reduced Keccak[J]. Journal of Computer Applications, 2018, 38(10): 2934-2939. DOI: 10.11772/j.issn.1001-9081.2018030617
Authors:LIU Xiaoqiang  WEI Yongzhuang  LIU Zhenghong
Affiliation:1. Guangxi Key Laboratory of Cryptography and Information Security(Guilin University of Electronic Technology), Guilin Guangxi 541004, China;2. Guangxi Key Laboratory of Wirekess Wideband Communication and Signal Processing(Guilin University of Electronic Technology), Guilin Guangxi 541004, China;3. Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems(Guilin University of Electronic Technology), Guilin Guangxi 541004, China
Abstract:Focusing on the linear decomposition of the S-box layer in Keccak algorithm, a new linear structure construction method was proposed based on the algebraic properties of the S-box. Firstly, to ensure the state data was still linear with that after this linear structure, some constraints about input bits of S-box needed to be fixed. Then, as an application of this technique, some new zero-sum distinguishers of round-reduced Keccak were constructed by combining the idea of meet-in-the-middle attack. The results show that a new 15-round distinguisher of Keccak is found, which extends 1-round forward and 1-round backward. This work is consistent with the best known ones and its complexity is reduced to 2257. The new distinguisher, which extends 1-round forward and 2-round backward, has the advantages of more free variables and richer distinging attack combinations.
Keywords:Secure Hash Algorithm 3 (SHA-3)   Hash algorithm   meet-in-the-middle   zero-sum distinguisher   linear structure
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号