首页> 外文会议>Selected areas in cryptography >All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
【24h】

All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach

机译:对分组密码的所有子密钥恢复攻击:扩展中间相遇方法

获取原文
获取原文并翻译 | 示例

摘要

We revisit meet-in-the-middle (MITM) attacks on block ciphers. Despite recent significant improvements of the MITM attack, its application is still restrictive. In other words, most of the recent MITM attacks work only on block ciphers consisting of a bit permutation based key schedule such as KTANTAN, GOST, IDEA, XTEA, LED and Piccolo. In this paper, we extend the MITM attack so that it can be applied to a wider class of block ciphers. In our approach, MITM attacks on block ciphers consisting of a complex key schedule can be constructed. We regard all subkeys as independent variables, then transform the game that finds the user-provided key to the game that finds all independent subkeys. We apply our approach called all subkeys recovery (ASR) attack to block ciphers employing a complex key schedule such as CAST-128, SHACAL-2, KATAN, FOX128 and Blowfish, and present the best attacks on them with respect to the number of attacked rounds in literature. Moreover, since our attack is simple and generic, it is applied to the block ciphers consisting of any key schedule functions even if the key schedule is an ideal function.
机译:我们重新讨论了针对分组密码的中间人(MITM)攻击。尽管最近对MITM攻击进行了重大改进,但其应用仍然受到限制。换句话说,大多数最近的MITM攻击仅适用于由基于比特排列的密钥调度(例如KTANTAN,GOST,IDEA,XTEA,LED和Piccolo)组成的块密码。在本文中,我们扩展了MITM攻击,以便可以将其应用于更广泛的分组密码类型。在我们的方法中,可以构建对由复杂密钥调度组成的分组密码的MITM攻击。我们将所有子项视为独立变量,然后将找到用户提供的键的游戏转换为找到所有独立子键的游戏。我们应用称为所有子密钥恢复(ASR)攻击的方法来使用复杂的密钥计划(例如CAST-128,SHACAL-2,KATAN,FOX128和Blowfish)来阻止密码,并根据被攻击的数量对它们进行最佳攻击四舍五入的文学作品。而且,由于我们的攻击既简单又通用,因此即使密钥调度是理想的功能,它也可应用于由任何密钥调度功能组成的分组密码。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号