【24h】

Cryptanalysis of Simpira v1

机译:Simpira V1的密码分析

获取原文
获取外文期刊封面目录资料

摘要

Simpira v1 is a recently proposed family of permutations, based on the AES round function. The design includes recommendations for using the Simpira permutations in block ciphers, hash functions, or authenticated ciphers. The designers' security analysis is based on computer-aided bounds for the minimum number of active S-boxes. We show that the underlying assumptions of independence, and thus the derived bounds, are incorrect. For family member Simpira-4, we provide differential trails with only 40 (instead of 75) active S-boxes for the recommended 15 rounds. Based on these trails, we propose full-round collision attacks on the proposed Simpira-4 Davies-Meyer hash construction, with complexity 2~(82.62) for the recommended full 15 rounds and a truncated 256-bit hash value, and complexity 2~(110.16) for 16 rounds and the full 512-bit hash value. These attacks violate the designers' security claims that there are no structural distinguishers with complexity below 2~(128).
机译:Simpira V1是最近提出的融合系列,基于AES圆功能。该设计包括在块密码,散列函数或经过身份验证的密码中使用Simpira排列的建议。设计人员的安全性分析基于用于最小有源S框的计算机辅助界限。我们表明,独立的独立假设,从而派生的界限,是不正确的。对于家庭成员SimPira-4,我们提供仅为40(而不是75个)有源S箱的差动小径,为推荐的15轮。基于这些路径,我们提出了全面的碰撞攻击拟议的Simpira-4 Davies-Meyer哈希施工,复杂2〜(82.62)为推荐的全15轮和一个截断的256位哈希值,以及复杂性2〜 (110.16)16轮和完整的512位哈希值。这些攻击违反了设计人员的安全声明,没有结构区别,复杂性低于2〜(128)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号