缩减轮数的Keccak区分器攻击
2012年, Keccak在SHA-3算法竞赛中脱颖而出成为SHA-3算法标准. 自此之后对Keccak算法的分析成为研究热点. 本文探究的是对缩减轮Keccak杂凑函数的差分区分器攻击. 在已有研究中, Sourav 和Meier等提出了一种6轮的Keccak区分器, 该区分器基于TDA算法、Double Kernel结构和Keccak内部置换的差分传播特性, 得到的区分器复杂度为252. 本文在上述结果的基础上, 首先改进了Willi Meier等提出的差分路径, 得到了一个更优的6轮差分区分器, 该结果为目前已知最好的6轮差分区分器, 数据复杂度为228; 接着文章探究7轮的差分区分器,...
Saved in:
Published in | Journal of Cryptologic Research Vol. 4; no. 5; p. 431 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | Chinese |
Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
01.01.2017
|
Subjects | |
Online Access | Get full text |
ISSN | 2097-4116 |
DOI | 10.13868/j.cnki.jcr.000195 |
Cover
Abstract | 2012年, Keccak在SHA-3算法竞赛中脱颖而出成为SHA-3算法标准. 自此之后对Keccak算法的分析成为研究热点. 本文探究的是对缩减轮Keccak杂凑函数的差分区分器攻击. 在已有研究中, Sourav 和Meier等提出了一种6轮的Keccak区分器, 该区分器基于TDA算法、Double Kernel结构和Keccak内部置换的差分传播特性, 得到的区分器复杂度为252. 本文在上述结果的基础上, 首先改进了Willi Meier等提出的差分路径, 得到了一个更优的6轮差分区分器, 该结果为目前已知最好的6轮差分区分器, 数据复杂度为228; 接着文章探究7轮的差分区分器,按照新的差分路径, 文章得到了新的7轮差分区分器, 但是因为在差分路径中Keccak内部函数的扩散作用, 增大了得到该差分路径的数据复杂度. 文章通过对于S盒性质的分析, 提出了一种S盒控制技术, 通过忽略一些对结果中的偏置位没有影响的S盒, 能够很好地降低得到该区分器的数据复杂度, 从而保证在7轮之后的输出中存在偏置位, 得到了一个复杂度为268的7 轮Keccak 区分器. |
---|---|
AbstractList | 2012年, Keccak在SHA-3算法竞赛中脱颖而出成为SHA-3算法标准. 自此之后对Keccak算法的分析成为研究热点. 本文探究的是对缩减轮Keccak杂凑函数的差分区分器攻击. 在已有研究中, Sourav 和Meier等提出了一种6轮的Keccak区分器, 该区分器基于TDA算法、Double Kernel结构和Keccak内部置换的差分传播特性, 得到的区分器复杂度为252. 本文在上述结果的基础上, 首先改进了Willi Meier等提出的差分路径, 得到了一个更优的6轮差分区分器, 该结果为目前已知最好的6轮差分区分器, 数据复杂度为228; 接着文章探究7轮的差分区分器,按照新的差分路径, 文章得到了新的7轮差分区分器, 但是因为在差分路径中Keccak内部函数的扩散作用, 增大了得到该差分路径的数据复杂度. 文章通过对于S盒性质的分析, 提出了一种S盒控制技术, 通过忽略一些对结果中的偏置位没有影响的S盒, 能够很好地降低得到该区分器的数据复杂度, 从而保证在7轮之后的输出中存在偏置位, 得到了一个复杂度为268的7 轮Keccak 区分器. |
Author | Zhou, J 于红波 刘新光 Liu, X G 周 界 Yu, H B |
Author_xml | – sequence: 1 givenname: X surname: Liu middlename: G fullname: Liu, X G – sequence: 2 givenname: J surname: Zhou fullname: Zhou, J – sequence: 3 givenname: H surname: Yu middlename: B fullname: Yu, H B – sequence: 4 fullname: 刘新光 – sequence: 5 fullname: 周 界 – sequence: 6 fullname: 于红波 |
BookMark | eNotzT9OwzAUgHEPRaKUXoAV1oT34th-HlHFP1GJpXvlOM9SU5SUhN4AUQYkFhjgBLAgZgrHScsxQILp237fluiUVclC7CDEKEnTfhH7cjqJC1_HAIBWdUQ3AWuiFFFvin7TTDJQSktKUuyKvfXna7u4__56Wz2-r5-vz9h7N23vPtrbm_bpZfWwbBfLbbER3EXD_f_2xOjocDQ4iYbnx6eDg2E0UyQja8ERgXGQAaIBnRrIUgyGg9KOpdfkmHJtgsvQI2vmAGwhz0E5y072xO4fO6uryzk3V-Oimtfl73GckCWyUkmUPwEITYU |
ContentType | Journal Article |
Copyright | 2017. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2017. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | JQ2 |
DOI | 10.13868/j.cnki.jcr.000195 |
DatabaseName | ProQuest Computer Science Collection |
DatabaseTitle | ProQuest Computer Science Collection |
DatabaseTitleList | ProQuest Computer Science Collection |
DeliveryMethod | fulltext_linktorsrc |
GroupedDBID | -SI -S~ ALMA_UNASSIGNED_HOLDINGS CAJEI JQ2 PB1 PB9 Q-- |
ID | FETCH-LOGICAL-p583-990a8807a0b011706470b41f7ef56ae3c68ae8d67fab1c1e6eef0e90dd05a9ea3 |
ISSN | 2097-4116 |
IngestDate | Mon Jun 30 07:26:31 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 5 |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p583-990a8807a0b011706470b41f7ef56ae3c68ae8d67fab1c1e6eef0e90dd05a9ea3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2898893531 |
PQPubID | 6503834 |
ParticipantIDs | proquest_journals_2898893531 |
PublicationCentury | 2000 |
PublicationDate | 20170101 |
PublicationDateYYYYMMDD | 2017-01-01 |
PublicationDate_xml | – month: 01 year: 2017 text: 20170101 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Beijing |
PublicationPlace_xml | – name: Beijing |
PublicationTitle | Journal of Cryptologic Research |
PublicationYear | 2017 |
Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
SSID | ssib055638241 ssib058688234 |
Score | 2.0887492 |
Snippet | 2012年, Keccak在SHA-3算法竞赛中脱颖而出成为SHA-3算法标准. 自此之后对Keccak算法的分析成为研究热点. 本文探究的是对缩减轮Keccak杂凑函数的差分区分器攻击. 在已有研... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 431 |
SubjectTerms | Complexity Control methods Cryptography Hash based algorithms |
Title | 缩减轮数的Keccak区分器攻击 |
URI | https://www.proquest.com/docview/2898893531 |
Volume | 4 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest Central issn: 2097-4116 databaseCode: BENPR dateStart: 20140101 customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.proquest.com/central omitProxy: true ssIdentifier: ssib055638241 providerName: ProQuest |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1Nb9Mw1CrdhQsCAeJjoB1mbilOYjv2MSmpKhgFoU4qXCrbdbQxqSulPbAzYhyQuMABfgFcEBcuDH5ONn4GtpM2hY5PKbIcx3Ge_V7eh_3sB8C6DDHJwkx7Oguoh42N4cmMSA-hLEAqCKNAWEPxdoe2N_HNHunVap8WvJamE9lQe8fuK_kfrJoyg1e7S_YfMDtv1BSYvMGvSQ2GTfpXOIZpBJMmjDlMCTRWPWvBlMHkBoxTmFLICUyQrcNjyPAtO4w7rmYTJrHLMMiozXAOY-ZewTBJytaS5Beaa3P8ZDQpmObcc2_u2LM9tVjrVTG7HmztTn9Yf7rvbttVvOcSFF5AQB3QpsRcfHFSwo9-mpSwsb-1PVilIjHnNXkcfMVKwZ-74HhigHjkYb_Ynjlj4HiBTskCM8aFfFkSEiGjzEkJNdzZbjxU44bTdEklEmduAJ07_dbmxka_m_a610aPPBuszC7ql5FbToCVIKI0qIOVJO3cvTdjZPbQNRZUeiYxH2SB83CYd6DcwGVhub4EyZJi4LSd7mlwqhyptbiguTOgtrd1FqwffXmf77_89vXD4euPR2-fFhSVv_icP3-Wv3l3-Oog3z84B7qttNtse2WUDW9EWOgZbUQYHh4JOyNuz1LCEZLYzyKdESp0qCgTmg1olAnpK19TrTOkORoMEBFci_A8qA93h_oCWFMh11QqY2BLjHmgZOZiWbMoFIoJJC6C1Vmv-uVf9LhvDH5mdGYjCi79_vFlcLKitFVQn4yn-opRCCfyajn83wH-Ql23 |
linkProvider | ProQuest |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E7%BC%A9%E5%87%8F%E8%BD%AE%E6%95%B0%E7%9A%84Keccak%E5%8C%BA%E5%88%86%E5%99%A8%E6%94%BB%E5%87%BB&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=Liu%2C+X+G&rft.au=Zhou%2C+J&rft.au=Yu%2C+H+B&rft.au=%E5%88%98%E6%96%B0%E5%85%89&rft.date=2017-01-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=4&rft.issue=5&rft.spage=431&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000195&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |