首页> 外文会议>Advance in cryptology - ASIACRYPT 2009 >The Key-Dependent Attack on Block Ciphers
【24h】

The Key-Dependent Attack on Block Ciphers

机译:对分组密码的密钥相关攻击

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we formalize an attack scheme using the key-dependent property, called key-dependent attack. In this attack, the intermediate value, whose distribution is key-dependent, is considered. The attack determines whether a key is right by conducting statistical hypothesis test of the intermediate value. The time and data complexity of the key-dependent attack is also discussed.rnWe also apply key-dependent attack on reduced-round IDEA. This attack is based on the key-dependent distribution of certain items in Biryukov-Demirci Equation. The attack on 5.5-round variant of IDEA requires 2~(21) chosen plaintexts and 2~(112.1) encryptions. The attack on 6-round variant requires 2~(49) chosen plaintexts and 2~(112.1) encryptions. Compared with the previous attacks, the key-dependent attacks on 5.5-round and 6-round IDEA have the lowest time and data complexity, respectively.
机译:在本文中,我们使用依赖于密钥的属性将攻击方案正式化,称为依赖密钥的攻击。在这种攻击中,将考虑其中间值取决于密钥的分布。攻击通过对中间值进行统计假设检验来确定密钥是否正确。还讨论了密钥相关攻击的时间和数据复杂性。我们还将密钥相关攻击应用于缩减回合的IDEA。此攻击基于Biryukov-Demirci方程中某些项的密钥相关分布。 IDEA 5.5轮变种的攻击需要选择2〜(21)个明文和2〜(112.1)个加密。对6轮变异的攻击需要选择2〜(49)个明文和2〜(112.1)个加密。与以前的攻击相比,针对5.5轮和6轮IDEA的密钥相关攻击分别具有最低的时间和数据复杂性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号