孙兵1, 2,
刘国强1,
李超1,,
1.国防科技大学文理学院 ??长沙 ??410073
2.湖南警察学院网络侦查技术湖南省重点实验室 ??长沙 ??410073
基金项目:国家重点研发计划(2017YFB0802000),国家自然科学基金(61672530, 61702537, 61772545),湖南省教育厅优秀青年项目(16B086),网络侦查技术湖南省重点实验室开放基金(2016WLZC018)
详细信息
作者简介:沈璇:男,1990年生,博士生,研究方向为分组密码的安全性分析
孙兵:男,1981年生,讲师,研究方向为对称密码的设计与分析
刘国强:男,1986年生,讲师,研究方向为对称密码的设计与分析
李超:男,1966年生,博士生导师,教授,研究方向为编码密码理论及其应用
通讯作者:李超 academic_lc@163.com
中图分类号:TN918.1计量
文章访问数:1412
HTML全文浏览量:627
PDF下载量:79
被引次数:0
出版历程
收稿日期:2018-03-16
修回日期:2018-07-25
网络出版日期:2018-08-06
刊出日期:2019-01-01
Impossible Differential Cryptanalysis of the Digital Video Broadcasting-common Scrambling Algorithm
Xuan SHEN1, 2,Bing SUN1, 2,
Guoqiang LIU1,
Chao LI1,,
1. College of Liberal Arts and Sciences, National University of Defense Technology, Changsha 410073, China
2. Hunan Provincial Key Laboratory of Network Investigational Technology, Changsha 410073, China
Funds:The National Key R&D Program of China (2017YFB0802000), The National Natural Science Foundation of China (61672530, 61702537, 61772545), The Project of Hunan Province Department of Education (16B086), The Open Research Fund of Hunan Provincial Key Laboratory of Network Investigational Technology (2016WLZC018)
摘要
摘要:数字视频广播通用加扰算法(DVB-CSA)是一种混合对称加密算法,由分组密码加密和流密码加密两部分组成。该算法通常用于保护视讯压缩标准(MPEG-2)中的信号流。主要研究DVB-CSA分组加密算法(DVB-CSA-Block Cipher, CSA-BC)的不可能差分性质。通过利用S盒的具体信息,该文构造了CSA-BC的22轮不可能差分区分器,该区分器的长度比已有最好结果长2轮。进一步,利用构造的22轮不可能差分区分器,攻击了缩减的25轮CSA-BC,该攻击可以恢复24 bit种子密钥。攻击的数据复杂度、时间复杂度和存储复杂度分别为253.3个选择明文、232.5次加密和224个存储单元。对于CSA-BC的不可能差分分析,目前已知最好结果能够攻击21轮的CSA-BC并恢复16 bit的种子密钥量。就攻击的长度和恢复的密钥量而言,该文的攻击结果大大改进了已有最好结果。
关键词:混合对称密码/
分组密码/
数字视频广播通用加扰算法/
不可能差分分析
Abstract:The Digital Video Broadcasting-Common Scrambling Algorithm (DVB-CSA) is a hybrid symmetric cipher. It is made up of the block cipher encryption and the stream cipher encryption. DVB-CSA is often used to protect MPEG-2 signal streams. This paper focuses on impossible differential cryptanalysis of the block cipher in DVB-CSA called CSA-BC. By exploiting the details of the S-box, a 22-round impossible differential is constructed, which is two rounds more than the previous best result. Furthermore, a 25-round impossible differential attack on CSA-BC is presented, which can recover 24 bit key. For the attack, the data complexity, the computational complexity and the memory complexity are 253.3 chosen plaintexts, 232.5 encryptions and 224 units, respectively. For impossible differential cryptanalysis of CSA-BC, the previous best result can attack 21-round CSA-BC and recover 16 bit key. In terms of the round number and the recovered key, the result significantly improves the previous best result.
Key words:Hybrid symmetric cipher/
Block cipher/
Digital Video Broadcasting-Common Scrambling Algorithm (DVB-CSA)/
Impossible differential cryptanalysis
PDF全文下载地址:
https://jeit.ac.cn/article/exportPdf?id=f442e50c-9121-4aca-bab9-4ba3f0b28319