首页> 外文会议>IEEE Symposium on Computers and Communication >Weak Keys and Plaintext Recovery for the Dhall-Pal Block Cipher
【24h】

Weak Keys and Plaintext Recovery for the Dhall-Pal Block Cipher

机译:DHALL-PAL块密码的弱键和明文恢复

获取原文

摘要

The Dhall-Pal Cipher (DPC) is a 128-bit block cipher with a 128-bit key introduced by Dhall and Pal in 2010. It is based on the substitution-permutation network (SPN) structure, and has elements in common with the Advanced Encryption Standard (AES). The most significant differences between the DPC and the AES occur in the linear transformation stage, some components of which are key-dependent in the DPC. In this paper we identify a large set of weak keys for the DPC, and we describe practical attacks enabled by these weak keys. We first present fast distinguishing attacks that succeed for approximately 2~(124) out of the 2~(128) keys. We then describe two plaintext-recovery attacks that succeed for 2~(120) keys. One of these plaintext-recovery attacks can decrypt any ciphertext using only 2~(11) encryptions on average.
机译:DHALL-PAL密码(DPC)是128位块密码,2010年DHALL和PAL引入了128位密钥。它基于替代排列网络(SPN)结构,并且具有与之共同的元素高级加密标准(AES)。 DPC和AE之间的最显着差异发生在线性变换阶段,其中一些组件在DPC中依赖于关键。在本文中,我们为DPC识别大量的弱键,我们描述了这些弱键启用的实际攻击。我们首先在2〜(128)键中,快速区分成功的攻击成功约2〜(124)。然后,我们描述了两个纯粹的恢复攻击,该攻击成功2〜(120)键。其中一个明文恢复攻击可以平均使用仅使用2〜(11)加密的任何密文。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号