首页> 外文会议>International Workshop on Fast Software Encryption >Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
【24h】

Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST

机译:相关的主要差异攻击27轮XTEA和全圆形的GOST

获取原文

摘要

In this paper, we present a related key truncated differential attack on 27 rounds of XTEA which is the best known attack so far. With an expected success rate of 96.9%, we can attack 27 rounds of XTEA using 2~(20.5) chosen plaintexts and with a complexity of 2~(115.15) 27-round XTEA encryptions. We also propose several attacks on GOST. First, we present a distinguishing attack on full-round GOST, which can distinguish it from a random permutation with probability 1 - 2~84 using a related key differential characteristic. We also show that H. Seki et al.'s idea combined with our related key differential characteristic can be applied to attack 31 rounds of GOST. Lastly, we propose a related key differential attack on full-round GOST. In this attack, we can recover 12 bits of the master key with 2~(35) chosen plaintexts, 2~(36) encryption operations and an expected success rate of 91.7%.
机译:在本文中,我们在27轮Xtea展示了一个相关的关键截断差异攻击,这是到目前为止的最佳已知攻击。预期的成功率为96.9%,我们可以使用2〜(20.5)选择的明文,并复杂2〜(115.15)27轮XTEA加密的复杂性攻击27轮XTEA。我们还提出了几次对GOST的攻击。首先,我们对全循环的GOST展示了一个显着的攻击,它可以使用相关的关键差分特性将其与概率1-2〜84的随机排列区分开来。我们还表明H. Seki等人的想法与我们相关的关键差分特性相结合,可以应用于攻击31轮GOST。最后,我们提出了一个关于全循环高层的关键差异攻击。在这次攻击中,我们可以用2〜(35)选择的明文,2〜(36)加密操作和预期成功率为91.7%,恢复12位。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号