【24h】

New Cryptanalytic Results on IDEA

机译:IDEA的新密码分析结果

获取原文
获取原文并翻译 | 示例

摘要

IDEA is a 64-bit block cipher with 128-bit keys introduced by Lai and Massey in 1991. IDEA is one of the most widely used block ciphers, due to its inclusion in several cryptographic packages, such as PGP and SSH. The cryptographic strength of IDEA relies on a combination of three incompatible group operations - XOR, addition and modular multiplication. Since its introduction in 1991, IDEA has withstood extensive cryptanalytic effort, but no attack was found on the full variant of the cipher. In this paper we present the first known non-trivial relation that involves all the three operations of IDEA. Using this relation and other techniques, we devise a linear attack on 5-round IDEA that uses 2~(19) known plaintexts and has a time complexity of 2~(103) encryptions. By transforming the relation into a related-key one, a similar attack on 7.5-round IDEA can be applied with data complexity of 2~(43.5) known plaintexts and a time complexity equivalent to 2~(115.1) encryptions. Both of the attacks are by far the best known attacks on IDEA.
机译:IDEA是Lai和Massey在1991年推出的具有128位密钥的64位分组密码。IDEA是使用最广泛的分组密码之一,因为它包含在多个密码包中,例如PGP和SSH。 IDEA的加密强度取决于三个不兼容的组操作的组合-XOR,加法和模乘。自1991年推出以来,IDEA经受了广泛的密码分析工作,但未发现对完整密码变种的攻击。在本文中,我们介绍了第一个涉及IDEA的三个运算的已知平凡关系。利用这种关系和其他技术,我们针对使用2〜(19)个已知明文并具有2〜(103)个加密的时间复杂度的5轮IDEA设计了线性攻击。通过将该关系转换为相关密钥,可以对7.5轮IDEA进行类似的攻击,其数据复杂度为2〜(43.5)个已知明文,时间复杂度相当于2〜(115.1)个加密。到目前为止,这两种攻击都是对IDEA的最著名的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号