首页> 外文会议>International conference on cryptology and network security >A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
【24h】

A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher

机译:针对完整MMB分组密码的实用相关密钥Boomerang攻击

获取原文

摘要

The MMB block cipher (Modular Multiplication-based Block cipher) is an iterative block cipher designed by Daemen, Govaerts, and Vandewalle in 1993 as an improvement of the PES and IPES ciphers. In this paper we present several new related-key differential characteristics of MMB. These characteristics can be used to form several related-key boomerangs to attack the full MMB. Using 2~(20) adaptive chosen plaintexts and ciphertexts we recover all key bits in 2~(35.2) time for the full MMB. Our attack was experimentally verified, and it takes less than 15 minutes on a standard Intel i5 machine to recover the full MMB key. After showing this practical attack on the full key of the full MMB, we present attacks on extended versions of MMB with up to 8 rounds (which is two more rounds than in the full MMB). We recover 64 out of the 128 key in time of 2~(32.2) for 7-round MMB, and time of 2~(32) for 8-round MMB using 2~(20) plaintexts.
机译:MMB分组密码(基于模块乘法的分组密码)是Daemen,Govaerts和Vandewalle在1993年设计的一种迭代分组密码,是对PES和IPES密码的改进。在本文中,我们介绍了MMB的几个新的相关关键差分特性。这些特征可用于形成几个相关的关键回旋镖,以攻击整个MMB。使用2〜(20)个自适应选择的明文和密文,我们可以在2〜(35.2)个时间内恢复整个MMB的所有密钥位。我们的攻击经过实验验证,在标准的Intel i5机器上花费不到15分钟的时间即可恢复完整的MMB密钥。在展示了对完整MMB完整密钥的实际攻击之后,我们提出了对多达8轮的MMB扩展版本的攻击(比完整MMB多两轮)。我们使用2〜(20)个纯文本从128个密钥中恢复64个,其中7轮MMB的时间为2〜(32.2),8轮MMB的时间为2〜(32)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号