首页> 外文会议>Fast Software Encryption >Impossible Differential Cryptanalysis of CLEFIA
【24h】

Impossible Differential Cryptanalysis of CLEFIA

机译:CLEFIA的不可能差分密码分析

获取原文
获取原文并翻译 | 示例

摘要

This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007, including new 9-round impossible differentials for CLEFIA, and the result of an impossible differential attack using them. For the case of a 128-bit key, it is possible to apply the impossible differential attack to CLEFIA reduced to 12 rounds. The number of chosen plaintexts required is 2~(118.9) and the time complexity is 2~(119). For key lengths of 192 bits and 256 bits, it is possible to apply impossible differential attacks to 13-round and 14-round CLEFIA. The respective numbers of chosen plaintexts required are 2~(119.8) and 2~(120.3) and the respective time complexities are 2~(146) and 2~(212). These impossible differential attacks are the strongest method for attacking reduced-round CLEFIA.
机译:本文报告了2007年提出的对128位块密码CLEFIA的不可能差分加密分析,包括针对CLEFIA的新的9轮不可能差分,以及使用它们进行不可能差分攻击的结果。对于128位密钥,可以对CLEFIA进行减少到12轮的不可能的差分攻击。所需的选择明文数量为2〜(118.9),时间复杂度为2〜(119)。对于192位和256位的密钥长度,可以对13轮和14轮CLEFIA施加不可能的差分攻击。所需的所选明文的各自数量为2〜(119.8)和2〜(120.3),各自的时间复杂度为2〜(146)和2〜(212)。这些不可能的差异攻击是攻击减少轮CLEFIA的最强方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号