E2算法的中间相遇攻击
作为AES的候选算法,E2算法由于其特殊的两层SP结构一直是人们研究的热点。研究了E2算法抵抗中间相遇攻击的能力。基于E2算法的结构,利用中间相遇的思想设计了一个4轮区分器,利用该区分器,对E2算法进行了5轮、6轮中间相遇攻击。研究结果表明,E2-128算法对于5轮中间相遇攻击以及E2-256算法对于6轮中间相遇攻击是不抵抗的。这是首次用中间相遇的攻击方法对E2算法进行的分析,相对于已有的结果,该方法降低了所用数据复杂度。...
Saved in:
| Published in | 计算机工程与科学 Vol. 37; no. 3; pp. 524 - 528 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | Chinese |
| Published |
武警工程大学电子技术系网络与信息安全武警部队重点实验室,陕西西安,710086%武警工程大学电子技术系网络与信息安全武警部队重点实验室,陕西西安710086
2015
武警工程大学信息安全研究所,陕西西安710086 |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1007-130X |
| DOI | 10.3969/j.issn.1007-130X.2015.03.019 |
Cover
| Summary: | 作为AES的候选算法,E2算法由于其特殊的两层SP结构一直是人们研究的热点。研究了E2算法抵抗中间相遇攻击的能力。基于E2算法的结构,利用中间相遇的思想设计了一个4轮区分器,利用该区分器,对E2算法进行了5轮、6轮中间相遇攻击。研究结果表明,E2-128算法对于5轮中间相遇攻击以及E2-256算法对于6轮中间相遇攻击是不抵抗的。这是首次用中间相遇的攻击方法对E2算法进行的分析,相对于已有的结果,该方法降低了所用数据复杂度。 |
|---|---|
| Bibliography: | As a candidate of AES,E2 algorithm has attracted wide attention because of its unique two SP structures.We evaluate the security of E2 block cipher against meet-in-the-middle attacks.Based on the idea of meet-in-the-middle,by analyzing the feathers of E2 algorithm,a 4-round distinguisher is designed.Using the distinguisher,some meet-in-the-middle attacks are made on 5/6-round E2-128/256.It is shown that the E2-128 algorithm to 5-round and the E2-256 algorithm to 6-round are not immune to meet-in-the-middle attacks.This is the first time to use the meet-in-the-middle attacks to analyze the E2 algorithm.Compared with the existing results,data complexity is reduced. GUAN Xiang,WEI Yue-chuan,YANG Xiao-yuan (1. Key Laboratory of Network & Information Security under the Chinese Armed Police Force, Department of Electronic, Engineering College of the Armed Police Force, Xi' an 710086; 2. Institute of Information Security, Engineering College of Chinese Armed Police Force, Xi' an 710086,China) 43-1258/TP block cipher; m |
| ISSN: | 1007-130X |
| DOI: | 10.3969/j.issn.1007-130X.2015.03.019 |