中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 期刊论文
题名:
7轮AES-128的非对称不可能飞来器攻击
作者: 董晓丽 ; 胡予濮 ; 陈杰 ; 韦永壮
关键词: 密码分析 ; Public key cryptography ; 分组密码 ; AES ; 飞来器 ; 时间复杂度Authentication
刊名: 计算机学报
发表日期: 2011
卷: 34, 期:7, 页:1300-1307
部门归属: 西安电子科技大学计算机网络与信息安全教育部重点实验室;中国科学院软件研究所信息安全国家重点实验室;桂林电子科技大学信息与通信学院
摘要: 分组密码是信息安全中实现数据加密、认证和密钥管理的核心密码算法,其安全性分析是密码学的重要课题之一.基于差分分析原理,文中提出了分组密码新的分析方法:非对称不可能飞来器攻击.该方法是通过构造非对称不可能飞来器区分器,排除满足这种关系的密钥,并最终恢复出秘密密钥的一种攻击方法.利用密钥编排方案,基于差分表查询技术和数据多次利用技术,把新方法应用于AES-128.研究结果表明:攻击7轮AES-128所需的数据复杂度为2105.18个选择明文,时间复杂度为2115.2次加密,存储复杂度为2106.78个AES分组.就攻击轮数、数据复杂度和时间复杂度而言,新分析优于已有针对AES-128的攻击.
英文摘要: Block cipher is the core of cryptography that provides data encryption, authentication and key management in information security. The security of block cipher is an important issue in the cryptanalysis. Based on the principle of differential cryptanalysis, this paper introduces a new cryptanalytic technique on block cipher: asymmetric impossible boomerang attack. The technique used asymmetric impossible boomerang distinguisher to eliminate wrong key material and leave the right key candidate. With key schedule considerations, techniques of looking up differential tables and re-using the data, the authors apply asymmetric impossible boomerang attack to AES-128. It is shown that attack on 7-round AES-128 requires data complexity of about 2105.18 chosen plaintexts, time complexity of about 2115.2 encryptions and memory complexity of about 2106.78 AES blocks. The presented result is better than any previous published cryptanalytic results on AES-128 in terms of the numbers of attacked rounds, the data complexity and the time complexity.
语种: 中文
内容类型: 期刊论文
URI标识: http://ir.iscas.ac.cn/handle/311060/14097
Appears in Collections:信息安全国家重点实验室_期刊论文

Files in This Item:
File Name/ File Size Content Type Version Access License
7轮AES_128的非对称不可能飞来器攻击.pdf(458KB)----限制开放-- 联系获取全文

Recommended Citation:
董晓丽,胡予濮,陈杰,等. 7轮AES-128的非对称不可能飞来器攻击[J]. 计算机学报,2011-01-01,34(7):1300-1307.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[董晓丽]'s Articles
[胡予濮]'s Articles
[陈杰]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[董晓丽]‘s Articles
[胡予濮]‘s Articles
[陈杰]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace