检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:邹剑 邹宏楷 董晓阳 吴文玲[4] 罗宜元 ZOU Jian;ZOU Hong-Kai;DONG Xiao-Yang;WU Wen-Ling;LUO Yi-Yuan(College of Computer and Data Science,Fuzhou University,Fuzhou 350108,China;Key Lab of Information Security of Network Systems(Fuzhou University),Fuzhou 350108,China;Institute for Advanced Study,Tsinghua University,Beijing 100190,China;Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China;School of Information Sciences and Technology,Huizhou University,Huizhou 516007,China)
机构地区:[1]福州大学计算机与大数据学院,福建福州350108 [2]网络系统信息安全福建省高校重点实验室(福州大学),福建福州350108 [3]清华大学高等研究院,北京100190 [4]中国科学院软件研究所可信计算与信息保障实验室,北京100190 [5]惠州学院信息科学技术学院,广东惠州516007
出 处:《软件学报》2023年第9期4239-4255,共17页Journal of Software
基 金:国家自然科学基金(61902073,62072445,62072207,62072109,U1804263);福建省自然科学基金(2021J01623,2021J06013)。
摘 要:针对Feistel, Misty与Type-1/2型广义Feistel等结构,创新性地将Simon算法的周期性质与生日攻击思想相结合,提出一种新型传统密钥恢复攻击.与Simon算法可以在多项式时间内恢复周期值不同,在传统计算环境下至少需要生日攻击界才能恢复出对应的周期值.利用所提方法,可以在O (2n/4)的选择明文和密文条件下,以O(23n/4)的时间复杂度恢复出5轮Feistel-F结构的密钥,对应的存储复杂度为O(2n/4).上述结果比Isobe和Shibutani的工作结果多扩展1轮,并且所需的存储复杂度也更少.对于Feistel-FK结构,构造7轮密钥恢复攻击.此外,还将上述方法应用于构造Misty结构和Type-1/2型广义Feistel结构的密钥恢复攻击.对于不同的Misty密码方案,分别给出5轮Misty L-F和Misty R-F结构的密钥恢复攻击,以及6轮Misty L-KF/FK和Misty R-KF/FK结构的密钥恢复攻击.对于d分支Type-1型广义Feistel结构,给出d2轮的密钥恢复攻击.当d≥6时,对于d分支Type-2型广义Feistel结构的新型密钥恢复攻击轮数会优于现有密钥恢复攻击轮数.This study proposes a new classical key recovery attack against schemes such as Feistel,Misty,and Type-1/2 generalized Feistel schemes(GFS),which creatively combines the birthday attack with the periodic property of Simon’s algorithm.Although Simon’s algorithm can recover the periodic value in polynomial time,this study requires the birthday bound to recover the corresponding periodic value in the classical setting.By this new attack,the key to a 5-round Feistel-F scheme can be recovered with the time complexity of O(23n/4)under the chosen plaintexts and ciphertexts of O(2^(n/4)),and the corresponding memory complexity is O(2^(n/4)).Compared with the results of Isobe and Shibutani,the above result not only increases one round but also requires lower memory complexity.For the Feistel-FK scheme,a 7-round key recovery attack is constructed.In addition,the above approach is applied to construct the key recovery attacks against Misty schemes and Type-1/2 GFS.Specifically,the key recovery attacks against the 5-round Misty L-F and Misty R-F schemes and those against the 6-round Misty L-KF/FK and Misty R-KF/FK schemes are given;for the d-branch Type-1 GFS,a d2-round key recovery attack is presented,and when d≥6,the number of rounds of the key recovery attack is superior to those of the existing key recovery attacks.
关 键 词:Feistel Misty Type-1/2型广义Feistel结构 密钥恢复攻击 Simon算法 周期性质 生日攻击
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.148.232.123