首页> 外文会议>International conference on swarm intelligence;ICSI 2010 >On the Strength Evaluation of Lesamnta against Differential Cryptanalysis
【24h】

On the Strength Evaluation of Lesamnta against Differential Cryptanalysis

机译:关于Lesamnta抗差异密码分析的强度评估

获取原文

摘要

We focus on the cryptographic hash algorithm Lesamnta-256. Lesamnta-256 consists of the Merkle-Damgard iteration of a compression function and an output function. The compression function consists of a mixing function and a key scheduling function. The mixing function consists of 32 rounds of four-way generalized Feistel structure. On each round there is a nonlinear function F with 64-bit input/output, which consists of the 4 steps of AES type of SPN (Substitution Permutation Network) structure. A subkey is XORed only at the first step of the SPN. The designers analyzed its security by assuming that the sub-key is XORed at every step of the SPN. Such an independent subkey assumption is also applied to the analysis of other SHA-3 candidates, e.g. Gr0stl, LANE, Luffa. However we analyze the security of these components of Lesamnta as is. We show that the 2 steps of SPN referred to as XS have the maximum differential probability 2~(11.415). This probability is greater than both of the differential characteristic probability 2~(-18) and the differential probability 2~(-12) derived under the independent subkey assumption. On the strength of whole compression function, we show that there are at least 15 active F functions in the mixing function on 64-bit truncated analysis. As the input bit length of the mixing function is 256, we can say that it is secure against differential attack if the maximum differential probability of F function is less than 2~(-256/15)≈ 2~(-17.067).We also show that the key scheduling function is secure against differential cryptanalysis.
机译:我们专注于密码哈希算法Lesannta-256。 Lesamnta-256由压缩函数和输出函数的Merkle-Damgard迭代组成。压缩功能包括混合功能和密钥调度功能。混合功能包括32轮四向广义Feistel结构。在每一轮中,都有一个带有64位输入/输出的非线性函数F,它由AES类型的SPN(替代置换网络)结构的4个步骤组成。子项仅在SPN的第一步进行异或。设计人员通过假设在SPN的每个步骤中对子密钥进行了XOR来分析其安全性。这种独立的子项假设也适用于其他SHA-3候选对象的分析,例如Gr0stl,LANE,Luffa。但是,我们将按原样分析Lesamnta的这些组件的安全性。我们证明了被称为XS的SPN的2步具有最大微分概率2〜(11.415)。该概率大于在独立子密钥假设下得出的差分特征概率2〜(-18)和差分概率2〜(-12)两者。关于整体压缩函数的强度,我们显示在64位截断分析的混合函数中至少有15个活动F函数。由于混合函数的输入位长度为256,因此可以说如果F函数的最大微分概率小于2〜(-256/15)≈2〜(-17.067),则可以防止差分攻击。还表明密钥调度功能可以安全地进行差分密码分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号