缩减轮数的Keccak区分器攻击

2012年, Keccak在SHA-3算法竞赛中脱颖而出成为SHA-3算法标准. 自此之后对Keccak算法的分析成为研究热点. 本文探究的是对缩减轮Keccak杂凑函数的差分区分器攻击. 在已有研究中, Sourav 和Meier等提出了一种6轮的Keccak区分器, 该区分器基于TDA算法、Double Kernel结构和Keccak内部置换的差分传播特性, 得到的区分器复杂度为252. 本文在上述结果的基础上, 首先改进了Willi Meier等提出的差分路径, 得到了一个更优的6轮差分区分器, 该结果为目前已知最好的6轮差分区分器, 数据复杂度为228; 接着文章探究7轮的差分区分器,...

Full description

Saved in:
Bibliographic Details
Published inJournal of Cryptologic Research Vol. 4; no. 5; p. 431
Main Authors Liu, X G, Zhou, J, Yu, H B, 刘新光, 周 界, 于红波
Format Journal Article
LanguageChinese
Published Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.01.2017
Subjects
Online AccessGet full text
ISSN2097-4116
DOI10.13868/j.cnki.jcr.000195

Cover

Abstract 2012年, Keccak在SHA-3算法竞赛中脱颖而出成为SHA-3算法标准. 自此之后对Keccak算法的分析成为研究热点. 本文探究的是对缩减轮Keccak杂凑函数的差分区分器攻击. 在已有研究中, Sourav 和Meier等提出了一种6轮的Keccak区分器, 该区分器基于TDA算法、Double Kernel结构和Keccak内部置换的差分传播特性, 得到的区分器复杂度为252. 本文在上述结果的基础上, 首先改进了Willi Meier等提出的差分路径, 得到了一个更优的6轮差分区分器, 该结果为目前已知最好的6轮差分区分器, 数据复杂度为228; 接着文章探究7轮的差分区分器,按照新的差分路径, 文章得到了新的7轮差分区分器, 但是因为在差分路径中Keccak内部函数的扩散作用, 增大了得到该差分路径的数据复杂度. 文章通过对于S盒性质的分析, 提出了一种S盒控制技术, 通过忽略一些对结果中的偏置位没有影响的S盒, 能够很好地降低得到该区分器的数据复杂度, 从而保证在7轮之后的输出中存在偏置位, 得到了一个复杂度为268的7 轮Keccak 区分器.
AbstractList 2012年, Keccak在SHA-3算法竞赛中脱颖而出成为SHA-3算法标准. 自此之后对Keccak算法的分析成为研究热点. 本文探究的是对缩减轮Keccak杂凑函数的差分区分器攻击. 在已有研究中, Sourav 和Meier等提出了一种6轮的Keccak区分器, 该区分器基于TDA算法、Double Kernel结构和Keccak内部置换的差分传播特性, 得到的区分器复杂度为252. 本文在上述结果的基础上, 首先改进了Willi Meier等提出的差分路径, 得到了一个更优的6轮差分区分器, 该结果为目前已知最好的6轮差分区分器, 数据复杂度为228; 接着文章探究7轮的差分区分器,按照新的差分路径, 文章得到了新的7轮差分区分器, 但是因为在差分路径中Keccak内部函数的扩散作用, 增大了得到该差分路径的数据复杂度. 文章通过对于S盒性质的分析, 提出了一种S盒控制技术, 通过忽略一些对结果中的偏置位没有影响的S盒, 能够很好地降低得到该区分器的数据复杂度, 从而保证在7轮之后的输出中存在偏置位, 得到了一个复杂度为268的7 轮Keccak 区分器.
Author Zhou, J
于红波
刘新光
Liu, X G
周 界
Yu, H B
Author_xml – sequence: 1
  givenname: X
  surname: Liu
  middlename: G
  fullname: Liu, X G
– sequence: 2
  givenname: J
  surname: Zhou
  fullname: Zhou, J
– sequence: 3
  givenname: H
  surname: Yu
  middlename: B
  fullname: Yu, H B
– sequence: 4
  fullname: 刘新光
– sequence: 5
  fullname: 周 界
– sequence: 6
  fullname: 于红波
BookMark eNotzT9OwzAUgHEPRaKUXoAV1oT34th-HlHFP1GJpXvlOM9SU5SUhN4AUQYkFhjgBLAgZgrHScsxQILp237fluiUVclC7CDEKEnTfhH7cjqJC1_HAIBWdUQ3AWuiFFFvin7TTDJQSktKUuyKvfXna7u4__56Wz2-r5-vz9h7N23vPtrbm_bpZfWwbBfLbbER3EXD_f_2xOjocDQ4iYbnx6eDg2E0UyQja8ERgXGQAaIBnRrIUgyGg9KOpdfkmHJtgsvQI2vmAGwhz0E5y072xO4fO6uryzk3V-Oimtfl73GckCWyUkmUPwEITYU
ContentType Journal Article
Copyright 2017. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2017. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID JQ2
DOI 10.13868/j.cnki.jcr.000195
DatabaseName ProQuest Computer Science Collection
DatabaseTitle ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
GroupedDBID -SI
-S~
ALMA_UNASSIGNED_HOLDINGS
CAJEI
JQ2
PB1
PB9
Q--
ID FETCH-LOGICAL-p583-990a8807a0b011706470b41f7ef56ae3c68ae8d67fab1c1e6eef0e90dd05a9ea3
ISSN 2097-4116
IngestDate Mon Jun 30 07:26:31 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 5
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p583-990a8807a0b011706470b41f7ef56ae3c68ae8d67fab1c1e6eef0e90dd05a9ea3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2898893531
PQPubID 6503834
ParticipantIDs proquest_journals_2898893531
PublicationCentury 2000
PublicationDate 20170101
PublicationDateYYYYMMDD 2017-01-01
PublicationDate_xml – month: 01
  year: 2017
  text: 20170101
  day: 01
PublicationDecade 2010
PublicationPlace Beijing
PublicationPlace_xml – name: Beijing
PublicationTitle Journal of Cryptologic Research
PublicationYear 2017
Publisher Chinese Association for Cryptologic Research, Journal of Cryptologic Research
Publisher_xml – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research
SSID ssib055638241
ssib058688234
Score 2.0887492
Snippet 2012年, Keccak在SHA-3算法竞赛中脱颖而出成为SHA-3算法标准. 自此之后对Keccak算法的分析成为研究热点. 本文探究的是对缩减轮Keccak杂凑函数的差分区分器攻击. 在已有研...
SourceID proquest
SourceType Aggregation Database
StartPage 431
SubjectTerms Complexity
Control methods
Cryptography
Hash based algorithms
Title 缩减轮数的Keccak区分器攻击
URI https://www.proquest.com/docview/2898893531
Volume 4
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ProQuest Central
  issn: 2097-4116
  databaseCode: BENPR
  dateStart: 20140101
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.proquest.com/central
  omitProxy: true
  ssIdentifier: ssib055638241
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1Nb9Mw1CrdhQsCAeJjoB1mbilOYjv2MSmpKhgFoU4qXCrbdbQxqSulPbAzYhyQuMABfgFcEBcuDH5ONn4GtpM2hY5PKbIcx3Ge_V7eh_3sB8C6DDHJwkx7Oguoh42N4cmMSA-hLEAqCKNAWEPxdoe2N_HNHunVap8WvJamE9lQe8fuK_kfrJoyg1e7S_YfMDtv1BSYvMGvSQ2GTfpXOIZpBJMmjDlMCTRWPWvBlMHkBoxTmFLICUyQrcNjyPAtO4w7rmYTJrHLMMiozXAOY-ZewTBJytaS5Beaa3P8ZDQpmObcc2_u2LM9tVjrVTG7HmztTn9Yf7rvbttVvOcSFF5AQB3QpsRcfHFSwo9-mpSwsb-1PVilIjHnNXkcfMVKwZ-74HhigHjkYb_Ynjlj4HiBTskCM8aFfFkSEiGjzEkJNdzZbjxU44bTdEklEmduAJ07_dbmxka_m_a610aPPBuszC7ql5FbToCVIKI0qIOVJO3cvTdjZPbQNRZUeiYxH2SB83CYd6DcwGVhub4EyZJi4LSd7mlwqhyptbiguTOgtrd1FqwffXmf77_89vXD4euPR2-fFhSVv_icP3-Wv3l3-Oog3z84B7qttNtse2WUDW9EWOgZbUQYHh4JOyNuz1LCEZLYzyKdESp0qCgTmg1olAnpK19TrTOkORoMEBFci_A8qA93h_oCWFMh11QqY2BLjHmgZOZiWbMoFIoJJC6C1Vmv-uVf9LhvDH5mdGYjCi79_vFlcLKitFVQn4yn-opRCCfyajn83wH-Ql23
linkProvider ProQuest
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E7%BC%A9%E5%87%8F%E8%BD%AE%E6%95%B0%E7%9A%84Keccak%E5%8C%BA%E5%88%86%E5%99%A8%E6%94%BB%E5%87%BB&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=Liu%2C+X+G&rft.au=Zhou%2C+J&rft.au=Yu%2C+H+B&rft.au=%E5%88%98%E6%96%B0%E5%85%89&rft.date=2017-01-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=4&rft.issue=5&rft.spage=431&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000195&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon