Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Blow-CAST-Fish key recovery attack based on differential tables
Xiaoling SUN, Shanshan LI, Guang YANG, Qiuge YANG
Journal of Computer Applications    2022, 42 (9): 2742-2749.   DOI: 10.11772/j.issn.1001-9081.2021071340
Abstract261)   HTML2)    PDF (1646KB)(71)       Save

Aiming at the problems of limited attack rounds and high attack complexity of Blow-CAST-Fish (Blow-C.Adams S.Tavares-Fish) algorithm, a key recovery attack of Blow-CAST-Fish algorithm based on differential table was proposed. Firstly, after analyzing the collision of S-box, based on the collision of two S-boxes and a single S-box respectively, the 6-round and 12-round differential characteristics were constructed. Secondly, the differential tables of f3 were calculated, and three rounds were expanded based on the specific differential characteristic, thereby determining the relationship between ciphertext difference and the input and output differences of f3. Finally, the plaintexts meeting the conditions were selected to encrypt, the input and output differences of f3 were calculated according to the ciphertext difference, and the corresponding input and output pairs were found by querying the differential table, as a result, the subkeys were obtained. At the situation of two S-boxes collision, the proposed attack completed a differential attack of 9-round Blow-CAST-Fish algorithm, compared with the comparison attack, the number of attack rounds was increased by one, and the time complexity was reduced from 2107.9 to 274. At the situation of single S-box collision, the proposed attack completed a differential attack of 15-round Blow-CAST-Fish algorithm, compared with the comparison attack, although the number of attack rounds was reduced by one, the proportion of weak keys was increased from 2 - 52.4 to 2 - 42 and the data complexity was reduced from 254 to 247. The test results show that the attack based on differential table can increase the efficiency of attack based on the same differential characteristics.

Table and Figures | Reference | Related Articles | Metrics
Searchable encryption scheme based on splittable inverted index
Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN
Journal of Computer Applications    2021, 41 (11): 3288-3294.   DOI: 10.11772/j.issn.1001-9081.2021010112
Abstract372)   HTML9)    PDF (639KB)(118)       Save

For retrieving the encrypted data in cloud environment quickly, an efficient searchable encryption scheme for batch data processing scenarios was proposed. Firstly, two inverted indexes were built by the client, one file index was used to store the file-keyword mapping, another empty search index was used to store keyword-file mapping. Then, these two indexes were submitted to the cloud server. The search indexwas gradually updated and constructed according to the search tokens and file indexesduring the user’s search by the cloud, and the search results of the searched keywords were recorded by this search index. In this way, the search index construction time was shared to each retrieval process effectively and the storage space of search index was reduced. A set storage method based on key-value structure was adopted by the indexes, which supported the at-the-same-time merging and splitting of index, which means when adding and deleting files, the corresponding file index and search index were generated by the client according to the file set to be added or deleted, then the server merged or split the indexes, so that the files were able to be added and deleted in batch quickly. Testing results show that the proposed scheme greatly improves the updating efficiency of files and is suitable for batch data processing. Through leakage function, it is proved that the proposed scheme can meet the indistinguishability security standard against adaptive dynamic keyword selection attack.

Table and Figures | Reference | Related Articles | Metrics