首页> 外文期刊>Tsinghua Science and Technology >Key-recovery attacks on LED-like block ciphers
【24h】

Key-recovery attacks on LED-like block ciphers

机译:对类似LED的分组密码的密钥恢复攻击

获取原文
获取原文并翻译 | 示例
       

摘要

Asymmetric cryptographic schemes, represented by RSA, have been shown to be insecure under quantum computing conditions. Correspondingly, there is a need to study whether the symmetric cryptosystem can still guarantee high security with the advent of quantum computers. In this paper, based on the basic principles of classical slide attacks and Simon's algorithm, we take LED-like lightweight block ciphers as research objects to present a security analysis under both classical and quantum attacks, fully considering the influence on the security of the ciphers of adding the round constants. By analyzing the information leakage of round constants, we can introduce the differential of the round constants to propose a classical slide attack on full-round LED-64 with a probability of 1. The analysis result shows that LED-64 is unable to resist this kind of classical slide attack, but that attack method is not applicable to LED-128. As for quantum attacks, by improving on existing quantum attack methods we demonstrate a quantum single-key slide attack on LED-64 and a quantum related-key attack on LED128, and indicators of the two attack algorithms are analyzed in detail. The attack results show that adding round constants does not completely improve the security of the ciphers, and quantum attacks can provide an exponential speed-up over the same attacks in the classical model. It further illustrates that the block cipher that is proved to be safe under classical settings is not necessarily secure under quantum conditions.
机译:以RSA为代表的非对称密码方案已被证明在量子计算条件下是不安全的。相应地,有必要研究对称密码系统是否仍能随着量子计算机的出现而保证高安全性。本文基于经典滑动攻击的基本原理和Simon算法,以类LED轻量级分组密码为研究对象,在充分考虑对密码安全性影响的基础上,进行了经典攻击和量子攻击下的安全性分析。添加舍入常数。通过分析舍入常数的信息泄漏,我们可以引入舍入常数的微分,对全舍入LED-64提出经典的滑动攻击,概率为1。分析结果表明,LED-64无法抵抗这种攻击。一种经典的滑行攻击,但该攻击方法不适用于LED-128。关于量子攻击,通过改进现有的量子攻击方法,我们演示了对LED-64的量子单键滑动攻击和对LED128的量子相关密钥攻击,并详细分析了这两种攻击算法的指标。攻击结果表明,添加舍入常数并不能完全提高密码的安全性,而量子攻击可以比经典模型中的相同攻击提供指数级的加速。它进一步说明,在经典设置下被证明是安全的分组密码在量子条件下不一定是安全的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号