首页> 外文会议>Annual international conference on the theory and applications of cryptographic techniques >Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT
【24h】

Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT

机译:改进线性攻击中的密钥恢复:应用于28轮PRESENT

获取原文

摘要

Linear cryptanalysis is one of the most important tools in use for the security evaluation of symmetric primitives. Many improvements and refinements have been published since its introduction, and many applications on different ciphers have been found. Among these upgrades, Collard et al. proposed in 2007 an acceleration of the key-recovery part of Algorithm 2 for last-round attacks based on the FFT. In this paper we present a generalized, matrix-based version of the previous algorithm which easily allows us to take into consideration an arbitrary number of key-recovery rounds. We also provide efficient variants that exploit the key-schedule relations and that can be combined with multiple linear attacks. Using our algorithms we provide some new cryptanalysis on PRESENT, including, to the best of our knowledge, the first attack on 28 rounds.
机译:线性密码分析是用于对称基元安全性评估的最重要工具之一。自从引入以来,已经发布了许多改进和改进,并且发现了在不同密码上的许多应用。在这些升级中,Collard等人。于2007年提出,基于FFT的算法2的密钥恢复部分将加速最后一轮攻击。在本文中,我们介绍了以前算法的基于矩阵的广义版本,可以轻松地使我们考虑任意数量的密钥恢复回合。我们还提供有效的变体,这些变体可以利用键与时间表之间的关系,并且可以与多种线性攻击结合使用。使用我们的算法,我们对PRESENT提供了一些新的密码分析方法,包括,据我们所知,包括28轮攻击中的第一次攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号