您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

J4 ›› 2010, Vol. 45 ›› Issue (4): 1-5.

• 论文 •    下一篇

改进的44轮SHACAL-2 的相关密钥攻击

贾珂婷1,2   

  1. 1. 山东大学数学学院, 山东 济南 250100;
    2. 山东大学密码技术与信息安全教育部重点实验室, 山东 济南 250100
  • 收稿日期:2010-02-01 出版日期:2010-04-10 发布日期:2010-05-19
  • 作者简介:贾珂婷(1983-),女,博士研究生,主要研究方向为对称密码分析与设计. Email:ktjia@mail.sdu.edu.cn
  • 基金资助:

    国家自然科学基金资助项目(60910118);山东省博士基金资助项目(BS2009DX030)

Improved related key attack on 44-round SHACAL-2

 JIA Ke-Ting1,2   

  1. 1. School of Mathematics, Shandong University,  Jinan 250100, Shandong, China;
    2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan 250100, Shandong, China
  • Received:2010-02-01 Online:2010-04-10 Published:2010-05-19

摘要:

采用相关密钥的三明治矩形攻击,改进了44轮SHACAL-2 的相关密钥攻击,利用模减差分和异或差分的混合表示方式以及采用差分集合代替单个差分提高差分路线的概率,构造的35轮相关密钥三明治矩形区分器的概率为2-430。利用该区分器给出了相关密钥情况下44轮SHACAL-2 的密钥恢复攻击,复杂度为2217个选择明文,2476.92次44轮SHACAL-2加密,2222 字节存储。

关键词: SHACAL-2;相关密钥;三明治矩形区分器;模减差分

Abstract:

The related key rectangle-like sandwich attack is used to improve cryptanalysis on 44-round SHACAL-2. With the combination of modular difference and XOR difference and  substituting a single difference with more differences, the probability of the differential path is improved and a 35-round related key rectangle-like sandwich distinguisher with probability 2-430 is given. Applying the distinguisher, the key recovery attack on 44-round SHACAL-2 with related keys is introduced, with 2217 chosen plaintexts, 2476.92 44-round encryptions and 2222 bytes of memory.

Key words: SHACAL-2; related key; rectangle-like sandwich distinguisher; modular difference

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!