计算机应用 ›› 2015, Vol. 35 ›› Issue (3): 700-703.DOI: 10.11772/j.issn.1001-9081.2015.03.700

• 信息安全 • 上一篇    下一篇

11轮3D分组密码算法的中间相遇攻击

李灵琛1,2, 韦永壮1,3, 朱嘉良1,3   

  1. 1. 广西信息科学实验中心(桂林电子科技大学), 广西 桂林 541004;
    2. 综合业务网理论及关键技术国家重点实验室(西安电子科技大学), 西安 710071;
    3. 信息安全国家重点实验室(中国科学院信息工程研究所), 北京 100190
  • 收稿日期:2014-10-22 修回日期:2014-11-20 出版日期:2015-03-10 发布日期:2015-03-13
  • 通讯作者: 李灵琛
  • 作者简介:李灵琛(1988-),女(回族),广西桂林人,硕士研究生,主要研究方向:信息安全;韦永壮(1976-),男(壮族),广西桂林人,教授,博士,主要研究方向:信息安全;朱嘉良(1987-),男,黑龙江绥化人,硕士研究生,主要研究方向:信息安全
  • 基金资助:

    国家自然科学基金资助项目(61100185)

Meet-in-the-middle attack on 11-round reduced 3D block cipher

LI Lingchen1,2, WEI Yongzhuang1,3, ZHU Jialiang1,3   

  1. 1. Guangxi Experiment Center of Information Sciences (Guilin University of Electronic Technology), Guilin Guangxi 541004, China;
    2. State Key Laboratory of Integrated Services Networks (Xidian University), Xi'an Shaanxi 710071, China;
    3. State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100190, China
  • Received:2014-10-22 Revised:2014-11-20 Online:2015-03-10 Published:2015-03-13

摘要:

针对3D分组密码算法的安全性分析,对该算法抵抗中间相遇攻击的能力进行了评估。基于3D算法的基本结构及S盒的差分性质,减少了在构造多重集时所需的猜测字节数,从而构建了新的6轮3D算法中间相遇区分器。然后,将区分器向前扩展2轮,向后扩展3轮,得到11轮3D算法中间相遇攻击。实验结果表明:构建区分器时所需猜测的字节数为42 B,攻击时所需的数据复杂度约为2497个选择明文,时间复杂度约为2325.3次11轮3D算法加密,存储复杂度约为2342 B。新攻击表明11轮3D算法对中间相遇攻击是不免疫的。

关键词: 分组密码, 3D算法, 中间相遇攻击, S盒, 区分器

Abstract:

Focusing on the safety analysis of the 3D block cipher, a new method on this algorithm against the meet-in-the-middle attack was proposed. Based on the structure of the 3D algorithm and the differential properties of the S-box, the research reduced the number of required bytes during structuring the multiple sets in this attack and constructed a new 6-round meet-in-the-middle distinguisher. According to extending the distinguisher 2-round forward and 3-round backward, an 11-round meet-in-the-middle attack of the 3D algorithm was finally achieved. The experimental results show that:the number of required bytes on constructed the distinguisher is 42, the attack requires a data complexity of about 2497 chosen plaintexts, a time complexity of about 2325.3 11-round 3D algorithm encryption and a memory complexity of about 2342 bytes. The new attack shows that the 11-round of the 3D algorithm is not immune to the meet-in-the-middle attack.

Key words: block cipher, 3D algorithm, meet-in-the-middle attack, S-box, distinguisher

中图分类号: