1. 桂林电子科技大学 广西密码学与信息安全重点实验室,广西壮族自治区 桂林 541004
2. 广西网信信息技术有限公司,广西壮族自治区 南宁 530000
[ "樊婷(1993—),女,桂林电子科技大学博士研究生,E-mail:[email protected];" ]
冯伟(1978—),男,工程师,E-mail:[email protected]
[ "韦永壮(1976—),男,教授,E-mail:[email protected]" ]
扫 描 看 全 文
樊婷, 冯伟, 韦永壮. 一种大状态轻量级密码S盒的设计与分析[J]. 西安电子科技大学学报, 2023,50(4):170-179.
樊婷, 冯伟, 韦永壮. 一种大状态轻量级密码S盒的设计与分析[J]. 西安电子科技大学学报, 2023,50(4):170-179. DOI: 10.19665/j.issn1001-2400.2023.04.017.
Alzette是2020年美密会上提出的基于ARX结构的64比特轻量级S盒,具备软硬件性能出色、扩散性强和安全性高等诸多优点,受到了国内外的广泛关注。然而,具有杰出性能与安全性的64比特轻量级S盒极少,如何设计出一种比Alzette性能更佳的大状态轻量级S盒是目前研究的难点。基于ARX结构,设计出一种性能与安全性兼优的大状态轻量级密码S盒,提出了“层次筛选法”,通过提前设置最优差分/线性特征的界来确定最佳循环移位参数,并对新密码S盒给出了安全性评估。结果表明:新密码S盒与Alzette的软硬件实现性能相当;同时5轮新密码S盒最优差分特征(线性逼近)的概率达到2,-17,(2,-8,),7轮新密码S盒的最优线性逼近概率达到2,-17,;而Alzette的5轮最优差分特征(线性逼近)概率为2,-10,>,2,-17,(2,-5,>,2,-8,),7轮最优线性逼近概率为2,-13,>,2,-17,。新密码S盒表现出更强的抗差分/线性密码分析的能力。
Alzette is a 64 bit lightweight S-box based on the ARX structure proposed at the CRYPTO 2020.It has many advantages such as excellent hardware and software performance,strong diffusion and high security,so that it receives wide attention domestically and internationally.However,64-bit lightweight S-boxes with execllent performance and security are rare.Whether it is possible to design the large state lightweight S-box with better performance than Alzette is difficult in current research.In this paper,a large state lightweight cryptographic S-box based on the ARX structure with an excellent performance and security is designed.A “hierarchy filtering method” is proposed to determine the optimal rotation parameters by setting the best differential/linear characteristic bounds in advance,and the security evaluation for the new S-box is given.It is shown that the software and hardware implementation performance of the new S-box is equivalent to that of the Alzette.For the new S-box,the probability of 5-round best differential characteristic (linear approximation) up to 2,-17,(2,-8,),and the probability of 7-round best linear approximation reaches 2,-17,.But for the Alzette,the 5-round best differential characteristic (linear approximation) with probability of 2,-10,>,2,-17,(2,-5,>,2,-8,),and the 7-round best linear approximation with probability of 2,-13,>,2,-17,.The new S-box shows a stronger resistance against differential cryptanalysis and linear cryptanalysis.
轻量级分组密码密码S盒差分密码分析线性密码分析
lightweight block ciphercryptographic S-boxdifferential cryptanalysislinear cryptanalysis
NIST. Lightweight Cryptography Projects (2021)[EB/OL].[2021-03-29]. https://csrc.nist.gov/Projects/lightweight-Cryptography/finalists. https://csrc.nist.gov/Projects/lightweight-Cryptography/finalistshttps://csrc.nist.gov/Projects/lightweight-Cryptography/finalists
CACR. 全国密码算法设计竞赛 (2018)[EB/OL].[2018-06-11]. https://sfjs.cacrnet.org.cn/site/term/list_76_1.html. https://sfjs.cacrnet.org.cn/site/term/list_76_1.htmlhttps://sfjs.cacrnet.org.cn/site/term/list_76_1.html
吴文玲, 张蕾, 郑雅菲, 等. 分组密码uBlock[J]. 密码学报, 2019, 6(6):690-703. DOI:10.13868/j.cnki.jcr.000334http://doi.org/10.13868/j.cnki.jcr.000334
WU Wenling, ZHANG Lei, ZHENG Yafei, et al. The Block Cipher uBlock[J]. Journal of Cryptologic Research, 2019, 6(6):690-703.
崔婷婷, 王美琴, 樊燕红, 等. Ballet:一个软件实现友好的分组密码算法[J]. 密码学报, 2019, 6(6):704-712. DOI:10.13868/j.cnki.jcr.000335http://doi.org/10.13868/j.cnki.jcr.000335
CUI Tingting, WANG Meiqin, FAN Yanhong, et al. Ballet:A Software-Friendly Block Cipher[J]. Journal of Cryptologic Research, 2019, 6(6):704-712.
CSRC. Lightweight Cryptography-Round 2 Candidates (2020)[EB/OL].[2020-06-20]. https://csrc.nist.gov/Projects/lightweightcryptog-raphy/round-2-candidates. https://csrc.nist.gov/Projects/lightweightcryptog-raphy/round-2-candidateshttps://csrc.nist.gov/Projects/lightweightcryptog-raphy/round-2-candidates
BERNSTEIN D J, KÖLBL S, LUCKS S, et al. Gimli:A Cross-Platform Permutation[C]// Proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017).Heidelberg:Springer, 2017:299-320.
BEIERLE C, BIRYUKOV A, DOS SANTOS L C, et al. Lightweight AEAD and Hashing Using the SPARKLE Permutation Family[J]. IACR Transactions on Symmetric Cryptology, 2020, 2020(S1):208-261.
叶涛, 韦永壮, 李灵琛. KNOT认证加密算法的零和区分器分析[J]. 西安电子科技大学学报, 2021, 48(1):76-86.
YE Tao, WEI Yongzhuang, LI Lingchen. Analysis of Zero-Sum Distinguisher of the KNOT Authenticated Encryption Algorithm[J]. Journal of Xidian University, 2021, 48(1):76-86.
谭豪, 申兵, 苗旭东, 等. Gimli认证加密方案的不可能差分分析[J]. 西安电子科技大学学报, 2022, 49(5):213-220.
TAN Hao, SHEN Bing, MIAO Xudong, et al. Impossible Differential Cryptanalysis of the Gimli Authenticated Encryption Scheme[J]. Journal of Xidian University, 2022, 49(5):213-220.
BEIERLE C, BIRYUKOV A, DOS SANTOS L C, et al. Alzette:A 64-bit ARX-Box[C]// Proceedings of the 40th Annual International Cryptology Conference (CRYPTO 2020).Heidelberg:Springer, 2020:419-448.
许峥, 李永强, 王明生. Alzette的安全性分析[J]. 密码学报, 2022, 9(4):698-708.
XU Zheng, LI Yongqiang, WANG Mingsheng. Security Analysis of Alzette[J]. Journal of Cryptologic Research, 2022, 9(4):698-708.
HUANG M, XU Z, WANG L. On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers[J]. The Computer Journal, 2022, 65(12):3062-3080. DOI:10.1093/comjnl/bxab126http://doi.org/10.1093/comjnl/bxab126https://academic.oup.com/comjnl/article/65/12/3062/6373560https://academic.oup.com/comjnl/article/65/12/3062/6373560
LIU Y, SUN S, LI C. Rotational Cryptanalysis from a Differential-Linear Perspective[C]// Proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2021).Heidelberg:Springer, 2021:741-770.
NIU Z, SUN S, LIU Y, et al. Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks[C]// Proceedings of 42nd Annual International Cryptology Conference (CRYPTO 2022).Heidelberg:Springer, 2022:3-32.
LIU Y, NIU Z, SUN S, et al. Rotational Differential-Linear Cryptanalysis Revisited[J]. Journal of Cryptology 2023, 36(3):1-45. DOI:10.1007/s00145-022-09441-3http://doi.org/10.1007/s00145-022-09441-3
MORAWIECKI P, PIEPRZYK J, SREBRNY M. Rotational Cryptanalysis of Round-Reduced Keccak[C]// Proceedings of the 20th International Workshop on Fast Software Encryption (FES 2013).Heidelberg:Springer, 2013:241-262.
BERTONI G, DAEMEN J, PEETERS M, et al. Keccak[C]// Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2013).Heidelberg:Springer, 2013:313-314.
LIPMAA H, MORIAI S. Efficient Algorithms for Computing Differential Properties of Addition[C]// Proceedings of the 8th International Workshop on Fast Software Encryption (FSE 2001).Heidelberg:Springer, 2002:336-350.
WALLÉN J. Linear Approximations of Addition Modulo 2n[C]// Proceedings of the 10th International Workshop on Fast Software Encryption (FSE 2003).Heidelberg:Springer, 2003:261-273.
NYBERG K, WALLÉN J. Improved Linear Distinguishers for SNOW 2.0[C]// Proceedings of the 13th International Workshop on Fast Software Encryption (FSE 2006).Heidelberg:Springer, 2006:144-162.
FU K, WANG M, GUO Y, et al. MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck[C]// Proceedings of the 23rd International Conference on Fast Software Encryption (FSE 2016).Heidelberg:Springer, 2016:268-288.
GUROBI. Gurobi optimizer 10.0.0 (2022)[EB/OL].[2022-11-10]. http://www.gurobi.cn/. http://www.gurobi.cn/http://www.gurobi.cn/
0
浏览量
4
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构