首页> 外文会议>Fast software encryption >Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
【24h】

Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes

机译:带有秘密S盒的当前密码的密码分析

获取原文
获取原文并翻译 | 示例

摘要

At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully cryptanalysed two and a half rounds. This paper considers PRESENT-like ciphers in a similar manner. We focus on the settings where the S-boxes are key dependent, and repeated for every round. We break one particular variant which was proposed in 2009 with practical complexity in a chosen plaintext/chosen ciphertext scenario. Extrapolating these results suggests that up to 28 rounds of such ciphers can be broken. Furthermore, we outline how our attack strategy can be applied to an extreme case where the S-boxes are chosen uniformly at random for each round and where the bit permutation is secret as well.
机译:在Eurocrypt 2001上,Biryukov和Shamir研究了类似AES的密码的安全性,其中替换和仿射变换都是密钥相关的,并且成功地进行了两轮半的密码分析。本文以类似的方式考虑类似PRESENT的密码。我们专注于S盒与键有关的设置,每轮重复一次。我们打破了2009年提出的一个特定变体,该变体在选定的纯文本/选定密文场景中具有实际的复杂性。根据这些结果推断,最多可以破坏28轮这种密码。此外,我们概述了如何将我们的攻击策略应用于极端情况,在这种极端情况下,每个回合随机选择S盒,并且位置换也是秘密的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号