...
首页> 外文期刊>Journal of Computational and Applied Mathematics >Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis
【24h】

Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis

机译:线性密码分析中新型复杂度模型的大规模高分辨率计算验证

获取原文
获取原文并翻译 | 示例

摘要

Linear cryptanalysis is one of the few major attack techniques in today's cryptography. Every new cipher comes with strong arguments against it. Still, some recent relevant ciphers such as the ISO/IEC lightweight block cipher present proved to be particularly vulnerable to linear cryptanalysis. Since most attacks published today - including the linear cryptanalysis - have complexities beyond practical reach, the evaluation of their complexities has to rely on rather theoretical computational models. The latter are often based on unproven and not always precise assumptions that might result in inexact models. Very recently, in FSE'13, it has been demonstrated that the standard models the cryptanalysts have been relying on for a long time in linear attacks, while being quite adequate for a wide range of parameters, tend to fail when the attack to be evaluated tries to recover a high number of bits in the secret key of the cipher. However, this is actually the top-priority goal of any adversary. To amend the standard models that proved somewhat inaccurate in this crucial parameter range, a new model has been proposed based on an enhanced wrong key randomization hypothesis. However, this model has been verified only for quite small ciphers of 20-bit block size. At the same time, in the real-world applications, the block size of a cipher is usually 32 bits and higher. Thus, the experimental verification of the model remains quite limited. In this article, we aim to bridge this gap and study this novel model for much bigger ciphers. We are able to perform its computational validation for cipher with up to 36 bits with meaningful resolution. Our work confirms that the new model of FSE'13 is significantly more accurate for a wide range of cipher parameters.
机译:线性密码分析是当今密码学中为数不多的主要攻击技术之一。每个新密码都带有强烈的反对意见。但是,最近一些相关的密码(例如,ISO / IEC轻量级分组密码)被证明特别容易受到线性密码分析的影响。由于今天发布的大多数攻击(包括线性密码分析)都具有超出实际范围的复杂性,因此对其复杂性的评估必须依靠相当理论的计算模型。后者通常基于未经证实且并非总是精确的假设,这可能会导致模型不精确。最近,在FSE'13中,已经证明,密码分析员长期以来一直在线性攻击中使用的标准模型,尽管对于各种参数都足够合适,但在评估攻击时却往往会失败尝试恢复密码秘密密钥中的大量位。但是,这实际上是所有对手的首要目标。为了修正在此关键参数范围内被证明有些不准确的标准模型,基于增强的错误密钥随机假设,提出了一种新模型。但是,此模型仅针对20位块大小的相当小的密码进行了验证。同时,在实际应用中,密码的块大小通常为32位或更高。因此,该模型的实验验证仍然十分有限。在本文中,我们旨在弥合这一差距,并针对更大的密码研究这种新颖的模型。我们能够以有意义的分辨率对多达36位的密码执行其计算验证。我们的工作证实,对于广泛的密码参数,FSE'13的新模型明显更精确。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号