中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Title:
meet-in-the-middle attack on 10-round reduced 3d block cipher
Author: Su Chong-Mao ; Wei Yong-Zhuang ; Ma Chun-Bo
Keyword: 分组密码 ; 3D算法 ; 中间相遇攻击 ; 时间复杂度
Source: Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology
Issued Date: 2012
Volume: 34, Issue:3, Pages:694-697
Indexed Type: EI ; CNKI
Department: (1) Department of Communication and Information Engineering Guilin University of Electronic Technology Guilin 541004 China; (2) State Key Laboratory of Integrated Services Networks Xi'an 710071 China; (3) State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Sponsorship: 国家自然科学基金(60862001,61100185)|广西自然科学基金(青年基金)项目(2011GXNSFB018071)资助课题
Abstract: 3D密码算法是一个代换-置换网络(SPN)型结构的新分组密码。与美国高级加密标准(AES)不同的是3D密码算法采用3维状态形式。该文利用3D算法结构,构造出一个5轮中间相遇区分器,并由此给出10轮3D的新攻击。结果表明:新攻击的数据复杂度约为2128选择明文,时间复杂度约为2331.1次10轮3D加密。与已有的攻击结构相比较,新攻击有效地降低了攻击所需的数据复杂度以及时间复杂度。
English Abstract: 3D cipher is a new block cipher with Substitution-Permutation Network (SPN) structure. Unlike the Advanced Encryption Standard (AES), 3D cipher uses a 3-dimensional state. Based on the structure of 3D cipher, a 5-round meet-in-the-middle distinguisher and a new attack on 10-round 3D are found. It is shown that the attack requires a data complexity of about 2128 chosen plaintexts and a time complexity of about 2331.1 10-round 3D encryptions. Compared with the previous published cryptanalytic results, the attack reduces the data complexity and time complexity efficiently.
Language: 中文
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/14913
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Su Chong-Mao,Wei Yong-Zhuang,Ma Chun-Bo. meet-in-the-middle attack on 10-round reduced 3d block cipher[J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology,2012-01-01,34(3):694-697.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Su Chong-Mao]'s Articles
[Wei Yong-Zhuang]'s Articles
[Ma Chun-Bo]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Su Chong-Mao]‘s Articles
[Wei Yong-Zhuang]‘s Articles
[Ma Chun-Bo]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace