...
首页> 外文期刊>IEICE Transactions on fundamentals of electronics, communications & computer sciences >Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
【24h】

Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks

机译:7轮MISTY1抵御高阶差分攻击的安全性分析

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper shows that higher order differential attacks can be successful against 7-round versions of MISTY1 with FL functions. The attack on 7-round MISTY1 can recover a partial subkey with a data complexity of 2~(54.1) and a computational complexity of 2~(120.8), which signifies the first successful attack on 7-round MISTY1 with no limitation such as a weak key. This paper also evaluates the complexity of this higher order differential attack on MISTY1 in which the key schedule is replaced by a pseudorandom function. It is shown that resistance to the higher order differential attack is not substantially improved even in 7-round MISTY1 in which the key schedule is replaced by a pseudorandom function.
机译:MISTY1是一种64位块密码,具有针对差分和线性密码分析的可证明的安全性。 MISTY1是在欧洲NESSIE项目中选择的算法之一,并且CRYPTREC项目已将其推荐给日本电子政务密码。本文显示,针对具有FL功能的MISTY1的7轮版本,高阶差分攻击可以成功。对7轮MISTY1的攻击可以恢复部分子密钥,其数据复杂度为2〜(54.1),计算复杂度为2〜(120.8),这表示对7轮MISTY1的首次成功攻击不受限制,例如弱键。本文还评估了对MISTY1的这种更高阶差分攻击的复杂性,在该攻击中,密钥调度被伪随机函数代替。结果表明,即使在7轮MISTY1中,用伪随机函数代替了密钥调度,对高阶差分攻击的抵抗也没有得到实质性的改善。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号