...
首页> 外文期刊>Journal of Cryptology >Slender-Set Differential Cryptanalysis
【24h】

Slender-Set Differential Cryptanalysis

机译:细长集差分密码分析

获取原文
获取原文并翻译 | 示例
           

摘要

This paper considers PRESENT-like ciphers with key-dependent S-boxes. We focus on the setting where the same selection of S-boxes is used in every round. One particular variant with 16 rounds, proposed in 2009, is broken in practice in a chosen plaintext/chosen ciphertext scenario. Extrapolating these results suggests that up to 28 rounds of such ciphers can be broken. Furthermore, we outline how our attack strategy can be applied to an extreme case where the S-boxes are chosen uniformly at random for each round, and where the bit permutation is key-dependent as well.
机译:本文考虑具有依赖于密钥的S盒的PRESENT类密码。我们专注于在每个回合中使用相同选择的S盒的设置。 2009年提出的一种特殊的16轮变体在选定的明文/选择密文方案中实际上被打破。根据这些结果推断,最多可以破坏28轮这种密码。此外,我们概述了如何将我们的攻击策略应用于极端情况,在这种极端情况下,每轮随机选择S盒,并且位排列也取决于密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号