首页> 外文会议>International Conference on Selected Areas in Cryptography >Iterative Differential Characteristic of TRIFLE-BC
【24h】

Iterative Differential Characteristic of TRIFLE-BC

机译:Trifle-BC的迭代差异特征

获取原文
获取外文期刊封面目录资料

摘要

TRIFLE is a Round 1 candidate of the NIST Lightweight Cryptography Standardization process. In this paper, we present an interesting 1-round iterative differential characteristic of the underlying block cipher TRIFLE-BC used in TRIFLE, which holds with probability of 2~(-3). Consequently, it allows to mount distinguishing attack on TRIFLE-BC for up to 43 (out of 50) rounds with data complexity 2~(124) and time complexity 2~(124). Most importantly, with such an iterative differential characteristic, the forgery attack on TRIFLE can reach up to 21 (out of 50) rounds with data complexity 2~(63) and time complexity 2~(63). Finally, to achieve key recovery attack on reduced TRIFLE, we construct a differential characteristic covering three blocks by carefully choosing the positions of the iterative differential characteristic. As a result, we can mount key-recovery attack on TRIFLE for up to 11 rounds with data complexity 2~(63) and time complexity 2~(104). Although the result in this paper cannot threaten the security margin of TRIFLE, we hope it can help further understand the security of TRIFLE.
机译:Trifle是NIST轻量级加密标准化过程的第1轮候选人。在本文中,我们介绍了在Trifle中使用的底层嵌段密码Trifle-BC的有趣的1次迭代差异特性,其具有2〜(3)的概率。因此,它允许在Trifle-BC上安装与数据复杂度2〜(124)和时间复杂度2〜(124)的Trifle-BC最多43(50个)。最重要的是,通过如此迭代的差异特性,对Trifle上的伪造攻击可以达到多达21(50个)的圆形,数据复杂性2〜(63)和时间复杂度2〜(63)。最后,为了在减少琐事上实现关键恢复攻击,我们通过仔细选择迭代差分特性的位置来构造覆盖三个块的差异特征。结果,我们可以在Trifle上安装键恢复攻击,最多11轮,数据复杂性2〜(63)和时间复杂性2〜(104)。虽然本文的结果无法威胁到琐事的安全缘,但我们希望它可以帮助进一步了解琐事的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号