首页> 外文会议>Advances in cryptology - EUROCRYPT 2009 >Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
【24h】

Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others

机译:在面向字节的块密码中自动搜索相关密钥的差分特征:在AES,山茶花,Khazad等中的应用

获取原文
获取原文并翻译 | 示例

摘要

While differential behavior of modern ciphers in a single secret key scenario is relatively well understood, and simple techniques for computation of security lower bounds are readily available, the security of modern block ciphers against related-key attacks is still very ad hoc. In this paper we make a first step towards provable security of block ciphers against related-key attacks by presenting an efficient search tool for finding differential characteristics both in the state and in the key (note that due to similarities between block ciphers and hash functions such tool will be useful in analysis of hash functions as well). We use this tool to search for the best possible (in terms of the number of rounds) related- key differential characteristics in AES, byte-Camellia, Khazad, FOX, and Anubis. We show the best related-key differential characteristics for 5, 11, and 14 rounds of AES-128, AES-192, and AES-256 respectively. We use the optimal differential characteristics to design the best related-key and chosen key attacks on AES-128 (7 out of 10 rounds), AES-192 (full 12 rounds), byte-Camellia (full 18 rounds) and Khazad (7 and 8 out of 8 rounds). We also show that ciphers FOX and Anubis have no related-key attacks on more than 4-5 rounds.
机译:尽管相对容易理解现代密码在单个秘密密钥场景中的差异行为,并且可以容易地获得用于计算安全性下限的简单技术,但是针对相关密钥攻击的现代分组密码的安全性仍然非常特殊。在本文中,我们通过提供一种用于查找状态和密钥中的差异特征的有效搜索工具,朝着可证明的分组密码对相关密钥攻击的安全性迈出了第一步(请注意,由于分组密码和哈希函数之间的相似性,例如工具也将对哈希函数的分析有用)。我们使用此工具在AES,byte-Camellia,Khazad,FOX和Anubis中搜索可能的最佳(按回合数)相关的关键差分特征。我们分别显示了针对5、11和14轮AES-128,AES-192和AES-256的最佳相关密钥差分特性。我们使用最佳差分特性来设计针对AES-128(每10轮中的7轮),AES-192(每轮12轮),Camellia字节(每轮18轮)和Khazad(每7轮)的最佳相关密钥和选择的密钥攻击8轮中有8轮)。我们还显示,密码FOX和Anubis在超过4-5轮中没有相关密钥攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号