【24h】

Integral Attacks on Round-Reduced Bel-T-256

机译:对圆形BEL-T-256的积分攻击

获取原文

摘要

Bel-T is the national block cipher encryption standard of the Republic of Belarus. It has a 128-bit block size and a variable key length of 128, 192 or 256 bits. Bel-T combines a Feistel network with a Lai-Massey scheme to build a complex round function with 7 S-box layers per round then iterate this round function 8 times to construct the whole cipher. In this paper, we present integral attacks against Bel-T-256 using the propagation of the bit-based division property. Firstly, we propose two 2-round integral characteristics by employing a Mixed Integer Linear Programming (MILP) (Our open source code to generate the MILP model can be downloaded from https://github.com/mhgharieb/ Bel-T-256) approach to propagate the division property through the round function. Then, we utilize these integral characteristics to attack 3(2/7) rounds (out of 8) Bel-T-256 with data and time complexities of 2~(13) chosen plaintexts and 2~(199.33) encryption operations, respectively. We also present an attack against 3 6/7 rounds with data and time complexities of 2~(33) chosen plaintexts and 2~(254.61) encryption operations, respectively. To the best of our knowledge, these attacks are the first published theoretical attacks against the cipher in the single-key model.
机译:BEL-T是白俄罗斯共和国的国家块密码加密标准。它具有128位块大小和128,192或256位的可变​​键长度。 BEL-T将FEISTEL网络与LAI-MASSEY方案组合起来构建一个复杂的圆形功能,每轮7个S盒层,然后迭代8次以构造整个密码。在本文中,我们使用基于位的划分属性的传播来对Bel-T-256的积分攻击呈现积分攻击。首先,我们通过采用混合整数线性编程(MILP)提出了两个2轮积分特性(我们的开源代码生成MILP模型可以从HTTPS://github.com/mhgharieb/ Bel-T-256下载)通过圆形函数传播分区属性的方法。然后,我们利用这些积分特征来攻击3(2/7)舍入(在8个)BEL-T-256中,其中2〜(13)的数据和时间复杂性分别选择的明文和2〜(199.33)加密操作。我们还展示了3 6/7轮的攻击,其中数据和时间复杂分别为2〜(33)个选定的明文和2〜(254.61)加密操作。据我们所知,这些攻击是首次发布对单键模型密码的理论攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号