首页> 外文会议>Annual International Cryptology Conference >Known-Key Distinguisher on Full PRESENT
【24h】

Known-Key Distinguisher on Full PRESENT

机译:全部礼物的已知钥匙区号

获取原文

摘要

In this article, we analyse the known-key security of the standardized PRESENT lightweight block cipher. Namely, we propose a known-key distinguisher on the full PRESENT, both 80- and 128-bit key versions. We first leverage the very latest advances in differential cryptanalysis on PRESENT, which are as strong as the best linear cryptanalysis in terms of number of attacked rounds. Differential properties are much easier to handle for a known-key distinguisher than linear properties, and we use a bias on the number of collisions on some predetermined input/output bits as distinguishing property. In order to reach the full PRESENT, we eventually introduce a new meet-in-the-middle layer to propagate the differential properties as far as possible. Our techniques have been implemented and verified on the small scale variant of PRESENT. While the known-key security model is very generous with the attacker, it makes sense in practice since PRESENT has been proposed as basic building block to design lightweight hash functions, where no secret is manipulated. Our distinguisher can for example apply to the compression function obtained by placing PRESENT in a Davies-Meyer mode. We emphasize that this is the very first attack that can reach the full number of rounds of the PRESENT block cipher.
机译:在本文中,我们分析了标准化本发明轻量级块密码的已知密钥安全性。即,我们提出了一个全部礼物的已知关键区段器,包括80和128位密钥版本。我们首先利用目前的差异密码分析的最新进展,这与攻击数量的最佳线性密码分析一样强。对于已知关键的区分器,差分性能比线性属性更容易处理,并且我们在某些预定输入/输出位上使用偏置的碰撞次数作为区分属性。为了达到全部礼物,我们最终引入了一个新的中间内层,以尽可能地传播差分性质。我们的技术已经实施和验证了现在的小规模变体。虽然已知关键的安全模型与攻击者非常慷慨,但在实践中有意义,因为已经提出了设计轻量级散列函数的基本构建块,而没有操纵秘密。我们的聊区可以例如应用于通过放置在Davies-Meyer模式中获得的压缩功能。我们强调这是一个最初的攻击,可以达到当前块密码的全部数量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号