J4 ›› 2010, Vol. 37 ›› Issue (1): 102-106+118.doi: 10.3969/j.issn.1001-2400.2010.01.018

• 研究论文 • 上一篇    下一篇

33轮SHACAL-2的差分非线性攻击

韦永壮1,2;胡予濮1;陈杰1,3
  

  1. (1. 西安电子科技大学 计算机网络与信息安全教育部重点实验室,陕西 西安  710071;
    2. 桂林电子科技大学 信息与通信学院,广西 桂林  541004;
    3. 中国科学院软件研究所 信息安全国家重点实验室,北京  100039)
  • 收稿日期:2008-10-20 出版日期:2010-02-20 发布日期:2010-03-29
  • 通讯作者: 韦永壮
  • 作者简介:韦永壮(1976-),男,桂林电子科技大学讲师,西安电子科技大学博士研究生,E-mail: walker_wei@msn.com.
  • 基金资助:

    国家自然科学基金资助项目(60673072);国家重点基础研究发展计划(“973”计划)基金资助项目(2007CB311201);国家部委科技重点实验室基金资助项目(9140C1107050806)

Differential-nonlinear attack on 33-round SHACAL-2

WEI Yong-zhuang1,2;HU Yu-pu1;CHEN Jie1,3
  

  1. (1. Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an  710071, China;
    2. School of Information and Communication, Guilin Univ. of Electronic Tech., Guilin  541004, China;
    3. State Key Lab. of Information Security, Inst. of Software, Chinese Academy of Sci., Beijing  100039, China)
  • Received:2008-10-20 Online:2010-02-20 Published:2010-03-29
  • Contact: WEI Yong-zhuang

摘要:

利用SHACAL-2的一个17轮差分非线性区分器,结合被猜测子密钥空间分割的方法和快速傅立叶变换,提出了一种攻击33轮SHACAL-2的新方法.该方法攻击33轮SHACAL-2需要244的选择明文、2496.6的33轮SHACAL-2加密和2502次算术运算,攻击成功概率为99%.与已有的结果相比较,新攻击有效地提高了单密钥下SHACAL-2的攻击轮数.

关键词: 分组密码, 差分非线性攻击, SHACAL-2算法, 计算复杂度

Abstract:

Based on a 17-round differential-nonlinear distinguisher of the SHACAL-2 encryption algorithm, a novel attack on 33-round SHACAL-2 is proposed by guessed subkey space division and Fast Fourier Transform (FFT). Moreover, it is shown that differential nonlinear attack on 33-round SHACAL-2 requires a data complexity of about 244 chosen plaintexts, and a computational complexity of about 2496.6 33-round SHACAL-2 encryptions and about 2502 arithmetic operations. The success rate of this attack is about 0.99. Compared with previous results, this new attack effectively improves the numbers of attacked rounds of SHACAL-2 in a single key attack scenario.

Key words: block ciphers, differential-nonlinear attack, SHACAL-2, computational complexity

Baidu
map