首页> 外文会议>Annual international cryptology conference >New Insights on AES-Like SPN Ciphers
【24h】

New Insights on AES-Like SPN Ciphers

机译:类似于AES的SPN密码的新见解

获取原文

摘要

It has been proved in Eurocrypt 2016 by Sun et al that if the details of the S-boxes are not exploited, an impossible differential and a zero-correlation linear hull can extend over at most 4 rounds of the AES. This paper concentrates on distinguishing properties of AES-like SPN ciphers by investigating the details of both the underlying S-boxes and the MDS matrices, and illustrates some new insights on the security of these schemes. Firstly, we construct several types of 5-round zero-correlation linear hulls for AES-like ciphers that adopt identical S-boxes to construct the round function and that have two identical elements in a column of the inverse of their MDS matrices. We then use these linear hulls to construct 5-round integrals provided that the difference of two sub-key bytes is known. Furthermore, we prove that we can always distinguish 5 rounds of such ciphers from random permutations even when the difference of the sub-keys is unknown. Secondly, the constraints for the S-boxes and special property of the MDS matrices can be removed if the cipher is used as a building block of the Miyaguchi-Preneel hash function. As an example, we construct two types of 5-round distinguishers for the hash function Whirlpool. Finally, we show that, in the chosen-ciphertext mode, there exist some nontrivial distinguishers for 5-round AES. To the best of our knowledge, this is the longest distinguisher for the round-reduced AES in the secret-key setting. Since the 5-round distinguisher for the AES can only be constructed in the chosen-ciphertext mode, the security margin for the round-reduced AES under the chosen-plaintext attack may be different from that under the chosen-ciphertext attack.
机译:Sun等人在Eurocrypt 2016中证明,如果不利用S-box的细节,则不可能的差分和零相关线性船体最多可以扩展到AES的4个回合。本文通过研究基础S-box和MDS矩阵的详细信息,着重于区分AES类SPN密码的属性,并说明了有关这些方案安全性的一些新见解。首先,我们为类AES的密码构造几种类型的5舍入零相关线性壳,它们采用相同的S盒构造舍入函数,并且在其MDS矩阵的逆列中具有两个相同的元素。然后,只要知道两个子密钥字节的差值,就可以使用这些线性包构建5舍入积分。此外,我们证明,即使子密钥的差异未知,我们也始终可以从随机排列中区分出5轮这样的密码。其次,如果将密码用作宫口-Preneel散列函数的构造块,则可以消除S-box的约束和MDS矩阵的特殊属性。例如,我们为哈希函数Whirlpool构造了两种类型的5轮区分符。最后,我们表明,在选择密文模式下,存在用于5轮AES的一些非平凡的区分符。据我们所知,这是秘密密钥设置中经过轮次缩减的AES的最长区分符。由于只能在选择密文模式下构造AES的5轮区分符,因此在选择明文攻击下经过舍入的AES的安全余量可能与在选择密文攻击下的安全余量有所不同。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号