删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

ACE密码算法的积分分析

本站小编 Free考研考试/2022-01-03

叶涛1, 2,
韦永壮1, 2,,,
李灵琛2
1.桂林电子科技大学广西无线宽带通信与信号处理重点实验室 桂林 541004
2.桂林电子科技大学广西密码学与信息安全重点实验室 桂林 541004
基金项目:国家自然科学基金(61872103),广西重点研发计划(桂科AB18281019),广西自然科学基金创新研究团队项目(2019GXNSFGA245004),广西研究生教育创新计划(YCBZ2018051),认知无线电与信息处理省部共建教育部重点实验室主任基金(CRKL180107)

详细信息
作者简介:叶涛:男,1991年生,博士生,研究方向为对称密码算法设计与分析
韦永壮:男,1976年生,教授,博士生导师,研究方向为对称密码算法设计与分析、加密芯片侧信道攻击与防御技术、网络安全协议分析
李灵琛:女,1988年生,博士,研究方向为分组密码算法设计与分析
通讯作者:韦永壮 walker_wyz@guet.edu.cn
中图分类号:TN918

计量

文章访问数:452
HTML全文浏览量:129
PDF下载量:65
被引次数:0
出版历程

收稿日期:2020-04-03
修回日期:2020-01-03
网络出版日期:2021-02-26
刊出日期:2021-04-20

Integral Cryptanalysis of ACE Encryption Algorithm

Tao YE1, 2,
Yongzhuang WEI1, 2,,,
Lingchen LI2
1. Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing, Guilin University of Electronic Technology, Guilin 541004, China
2. Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin 541004, China
Funds:The National Natural Science Foundation of China(61872103), The Foundation of Guangxi Science and Technology Program (Guike AB18281019), The Innovation Research Team Project of Guangxi Natural Science Foundation(2019GXNSFGA245004), The Innovation Project of Guangxi Graduate Education(YCBZ2018051), The Foundation of Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education (Guilin University of Electronic Technology)(CRKL180107)


摘要
摘要:ACE是国际轻量级密码算法标准化征集竞赛第2轮候选算法之一。该算法具有结构简洁,软硬件实现快、适用于资源受限环境等特点,其安全性备受业界广泛关注。该文引入字传播轨迹新概念,构建了一个传播轨迹的描述模型,并给出一个可以自动化评估分组密码算法抵抗积分攻击能力的方法。基于ACE算法结构特点,将该自动化搜索方法应用于评估ACE算法的安全性。结果表明:ACE置换存在12步的积分区分器,需要的数据复杂度为2256,时间复杂度为2256次12步的ACE置换运算,存储复杂度为8 Byte。相比于ACE算法设计者给出的积分区分器,该新区分器的步数提高了4步。
关键词:积分区分器/
混合整数线性规划/
自动化分析方法/
ACE置换
Abstract:ACE as an authenticated encryption algorithm is selected as one of the round 2 candidates of the lightweight crypto standardization process. Since its excellent design advantages, e.g. simple structure, high performance in software and hardware, and suitable for constrained environments, the security of ACE is received extensive attention. In this paper, the concept of word propagation trail is introduced, and an exact model is constructed to describe the trail. A new automatic method for evaluating the security of word-based cipher against the integral attack is also proposed by using this model. Moreover, based on the structure of ACE, the security of ACE permutation is evaluated by using this new automatic method. More specifically, a new 12-step integral distinguisher of ACE permutation is verified by using this method, which requires the data complexity of about 2256 chosen data, the time complexity of about 2256 12-step ACE permutation operations, and the memory complexity of about 8 Byte. Compared with the distinguishers given by ACE’s designer, this new result prominently increases 4 steps indeed.
Key words:Integral distinguisher/
Mixed Integer Linear Programming(MILP)/
Automatic cryptanalysis/
ACE permutation



PDF全文下载地址:

https://jeit.ac.cn/article/exportPdf?id=92441f67-8107-4a12-8fdb-368bbf94f80f
相关话题/广西 自动化 设计 桂林电子科技大学 传播