JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >
このアイテムの引用には次の識別子を使用してください:
http://hdl.handle.net/10119/14221
|
タイトル: | Accurate Estimation of the Full Differential Distribution for General Feistel Structures |
著者: | Chen, Jiageng Miyiaji, Atsuko Su, Chunhua The, Je Sen |
キーワード: | Differential attack General Feistel Structure(GFS) Differential distribution LBlock TWINE |
発行日: | 2016-05-07 |
出版者: | Springer |
誌名: | Lecture Notes in Computer Science |
巻: | 9589 |
開始ページ: | 108 |
終了ページ: | 124 |
DOI: | 10.1007/978-3-319-38898-4_7 |
抄録: | Statistical cryptanalysis is one of the most powerful tools to analyze symmetric key cryptographic primitives such as block ciphers. One of these attacks, the differential attack has been demonstrated to break a wide range of block ciphers. Block cipher proposals previously obtain a rough estimate of their security margin against differential attacks by counting the number of active S-Box along a differential path. However this method does not take into account the complex clustering effect of multiple differential paths. Analysis under full differential distributions have been studied for some extremely lightweight block ciphers such as KATAN and SIMON, but is still unknown for ciphers with relatively large block sizes. In this paper, we provide a framework to accurately estimate the full differential distribution of General Feistel Structure (GFS) block ciphers with relatively large block sizes. This framework acts as a convenient tool for block cipher designers to determine the security margin of their ciphers against differential attacks. We describe our theoretical model and demonstrate its correctness by performing experimental verification on a toy GFS cipher. We then apply our framework to two concrete GFS ciphers, LBlock and TWINE to derive their full differential distribution by using super computer. Based on the results, we are able to attack 25 rounds of TWINE-128 using a distinguishing attack, which is comparable to the best attack to date. Besides that, we are able to depict a correlation between the hamming weight of an input differential characteristic and the complexity of the attack. Based on the proposed framework, LBlock and TWINE have shown to have 178 and 208-bit security respectively. |
Rights: | This is the author-created version of Springer, Jiageng Chen, Atsuko Miyiaji, Chunhua Su and Je Sen Teh, Lecture Notes in Computer Science, 9589, 2016, 108-124. The original publication is available at www.springerlink.com, http://dx.doi.org/10.1007/978-3-319-38898-4_7 |
URI: | http://hdl.handle.net/10119/14221 |
資料タイプ: | author |
出現コレクション: | b10-1. 雑誌掲載論文 (Journal Articles)
|
このアイテムのファイル:
ファイル |
記述 |
サイズ | 形式 |
22232.pdf | | 3367Kb | Adobe PDF | 見る/開く |
|
当システムに保管されているアイテムはすべて著作権により保護されています。
|