Title: | hyper-sbox view of aes-like permutations: a generalized distinguisher |
Author: | Wu Shuang
; Feng Dengguo
; Wu Wenling
; Su Bozhan
|
Source: | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
Conference Name: | 6th China International Conference on Information Security and Cryptology, Inscrypt 2010
|
Conference Date: | 20-Oct
|
Issued Date: | 2011
|
Conference Place: | Shanghai, China
|
Keyword: | Cryptography
|
Publish Place: | Germany
|
ISSN: | 3029743
|
ISBN: | 9783642215179
|
Department: | (1) State Key Lab. of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
|
Sponsorship: | State Key Laboratory of Information Security; Chinese Academy of Sciences; Chinese Association for Cryptologic Research
|
English Abstract: | Grøstl[1] is one of the second round candidates of the SHA-3 competition[2] hosted by NIST, which aims to find a new hash standard. In this paper, we studied equivalent expressions of the generalized AES-like permutation. We found that four rounds of the AES-like permutation can be regarded as a Hyper-Sbox. Then we further analyzed the differential properties of both Super-Sbox and Hyper-Sbox. Based on these observations, we give an 8-round truncated differential path of the generalized AES-like permutation, which can be used to construct a distinguisher of 8-round Grøstl-256 permutation with 264 time and 264 memory. This is the best known distinguisher of reduced-round Grøstl permutation. © 2011 Springer-Verlag. |
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/14283
|
Appears in Collections: | 信息安全国家重点实验室_会议论文
|
File Name/ File Size |
Content Type |
Version |
Access |
License |
|
hyper-sbox view of aes-like permutations a generalized distinguisher.pdf(303KB) | -- | -- | 限制开放 | -- | 联系获取全文 |
|
Recommended Citation: |
Wu Shuang,Feng Dengguo,Wu Wenling,et al. hyper-sbox view of aes-like permutations: a generalized distinguisher[C]. 见:6th China International Conference on Information Security and Cryptology, Inscrypt 2010. Shanghai, China. 20-Oct.
|
|
|