1. 保密通信重点实验室,四川 成都 610041
2. 中国电子科技集团公司电子科学研究院,北京 100041
[ "张 峰(1997—),男,中国电子科技集团公司电子科学研究院硕士研究生,E-mail:[email protected]; " ]
[ "刘正斌(1985—),男,高级工程师,E-mail:[email protected]; " ]
[ "张 晶(1995—),女,工程师,E-mail:[email protected]; " ]
[ "张文政(1966—),男,研究员,E-mail:[email protected]" ]
纸质出版日期:2024-4-20,
网络出版日期:2023-10-19,
收稿日期:2023-1-12,
扫 描 看 全 文
张峰, 刘正斌, 张晶, 等. 一种计算ARX密码差分—线性偏差的新方法[J]. 西安电子科技大学学报, 2024,51(2):211-223.
Feng ZHANG, Zhengbin LIU, Jing ZHANG, et al. New method for calculating the differential-linear bias of the ARX cipher[J]. Journal of Xidian University, 2024,51(2):211-223.
张峰, 刘正斌, 张晶, 等. 一种计算ARX密码差分—线性偏差的新方法[J]. 西安电子科技大学学报, 2024,51(2):211-223. DOI: 10.19665/j.issn1001-2400.20230404.
Feng ZHANG, Zhengbin LIU, Jing ZHANG, et al. New method for calculating the differential-linear bias of the ARX cipher[J]. Journal of Xidian University, 2024,51(2):211-223. DOI: 10.19665/j.issn1001-2400.20230404.
ARX密码由模加、循环移位和异或这3种基本运算组成。目前ARX密码差分—线性区分器偏差的计算大多采用统计分析的方法。在2022年美密会上
NIU等给出了一种计算ARX密码差分—线性区分器相关度的非统计分析的方法
并给出了SPECK32/64的10轮差分—线性区分器。基于BLONDEAU等和BAR-ON等的方法
给出了差分—线性特征的定义
并首次提出了用差分—线性特征计算差分—线性区分器偏差的方法。同时
提出了一种基于布尔可满足性问题(SAT)自动化技术搜索差分—线性特征的方法
给出了计算ARX密码差分—线性区分器偏差的非统计分析的新方法。作为应用
对NIU等给出的SPECK32/64的10轮差分—线性区分器偏差进行计算
得到的理论值为2
-15.00
非常接近统计分析的实验值2
-14.90
且优于NIU等给出的理论值2
-16.23
。同时
首次给出了SIMON32/64的9轮差分—线性区分器偏差的理论值2
-8.41
接近统计分析得到的实验值2
-7.12
。实验结果说明了这种方法的有效性。
The ARX cipher consists of three basic operations
additions
rotations and XORs.Statistical analysis is currently used to calculate the bias of the ARX cipher differential-linear distinguishers.At CRYPTO 2022
NIU et al.gave a method for evaluating the correlation of the ARX cipher differential-linear distinguishers without using statistical analysis.They gave a 10-round differential-linear distinguisher for SPECK32/64.This paper gives the definition of differential-linear characteristics.It presents the first method for calculating the bias of differential-linear distinguishers using differential-linear characteristics based on the methods by BLONDEAU et al.and BAR-ON et al.Also
a method for searching for differential-linear characteristics based on Boolean Satisfiability Problem(SAT) automation techniques is proposed
which is a new method for calculating the bias of the ARX cipher differential-linear distinguisher without statistical analysis.As an application
the bias of the 10-round differential-linear distinguisher for SPECK32/64 given by NIU et al.is calculated with the theoretical value 2
-15.00
obtained
which is very close to the experimental value 2
-14.90
from the statistical analysis and better than the theoretical value 2
-16.23
given by NIU et al.Also
the first theoretical value 2
-8.41
for the bias of the 9-round differential-linear distinguisher for SIMON32/64 is given
which is close to the experimental value 2
-7.12
obtained by statistical analysis.Experimental results fully demonstrate the effectiveness of this method.
差分—线性区分器ARX密码SAT/SMTSPECKSIMON
differential-linear cryptanalysisARXSAT/SMTSPECKSIMON
董新锋, 张文政, 许春香. Feistel 结构的8比特轻量化S盒[J]. 西安电子科技大学学报, 2021, 48(1):69-75.
DONG Xinfeng, ZHANG Wenzheng, XU Chunxiang. 8 Bits Lightweight S-box with the Feistel Structure[J]. Journal of Xidian University, 2021, 48(1):69-75.
BEAULIEU R, SHORS D, SMITH J, et al. The SIMON and SPECK Families of Lightweight Block Ciphers(2013)[J/OL].[2023-06-20]. https://eprint.iacr.org/2013/404. https://eprint.iacr.org/2013/404https://eprint.iacr.org/2013/404
LANGFORD S K, HELLMAN M E. Differential-Linear Cryptanalysis[C]//Advances in Cryptology—CRYPTO 1994.Berlin:Springer, 1994:17-25.
BIHAM E, DUNKELMAN O, KELLER N. Enhancing Differential-Linear Cryptanalysis[C]//Advances in Cryptology—ASIACRYPT 2002. Berlin:Springer, 2002:254-266.
BLONDEAU C, LEANDER G, NYBERG K. Differential-Linear Cryptanalysis Revisited[J]. Journal of Cryptology, 2017, 30(3):859-888.
BAR-ON A, DUNKELMAN O, KELLER N, et al. DLCT:A New Tool for Differential-Linear Cryptanalysis[C]//Advances in Cryptology-EUROCRYPT 2019. Berlin:Springer, 2019:313-342.
LEURENT G. Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning[C]//Advances in Cryptology-EUROCRYPT 2016. Berlin:Springer, 2016:344-371.
BEIERLE C, BROLL M, CANALE F, et al. Improved Differential-Linear Attacks with Applications to ARX Ciphers[J]. Journal of Cryptology, 2022, 35(4):1-61.
COUTINHO M, SOUZA NETO T C. Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha[C]//Advances in Cryptology-EUROCRYPT 2021. Berlin:Springer, 2021:711-740.
DEY S, GARAI H K, SARKAR S, et al. Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha[C]//Advances in Cryptology-EUROCRYPT 2022. Berlin:Springer, 2022:86-114.
王非凡. 轻量级ARX型分组密码的差分-线性攻击框架[D]. 上海: 华东师范大学, 2022.
LIU Y, SUN S, LI C. Rotational Cryptanalysis from a Differential-Linear Perspective[C]//Advances in Cryptology-EUROCRYPT 2021. Berlin:Springer, 2021:741-770.
MORAWIECKI P, PIEPRZYK J, SREBRNY M. Rotational Cryptanalysis of Round-Reduced Keccak[C]//Fast Software Encryption: 20th International Workshop. Berlin:Springer, 2013:241-262.
NIU Z, SUN S, LIU Y, et al. Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks[C]//Advances in Cryptology-CRYPTO 2022. Berlin:Springer, 2022:3-32.
MOUHA N, PRENEEL B. Towards Finding Optimal Differential Characteristics for ARX:Application to Salsa20 (2013)[J/OL].[2023-11-13]. https://eprint.iacr.org/2013/328. https://eprint.iacr.org/2013/328https://eprint.iacr.org/2013/328
KÖLBL S, LEANDER G, TIESSEN T. Observations on the SIMON Block Cipher Family[C]//Advances in Cryptology-CRYPTO 2015. Berlin:Springer, 2015:161-185.
LIU Y, WANG Q, RIJMEN V. Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey[C]//Applied Cryptography and Network Security:14th International Conference.Berlin:Springer,2016:485-499.
SUN L, WANG W, WANG M. Accelerating the Search of Differential and Linear Characteristics with the SAT Method[J]. IACR Transactions on Symmetric Cryptology, 2021(1):269-315.
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构