首页> 外文期刊>Information Processing Letters >A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
【24h】

A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock

机译:针对22轮轻量级分组密码LBlock的相关密钥不可能的差分攻击

获取原文
获取原文并翻译 | 示例
           

摘要

LBlock is a new lightweight block cipher proposed by Wu and Zhang (2011) [12] at ACNS 2011. It is based on a modified 32-round Feistel structure. It uses keys of length 80 bits and message blocks of length 64 bits. In this letter, we examine the security arguments given in the original article and we show that we can improve the impossible differential attack given in the original article on 20 rounds by constructing a 22-round related key impossible differential attack that relies on intrinsic weaknesses of the key schedule. This attack has a complexity of 2~(70) cipher operations using 2~(47) plaintexts. This result was already published in Minier and Naya-Plasencia (2011) [9].
机译:LBlock是Wu和Zhang(2011)[12]在ACNS 2011上提出的一种新的轻量级分组密码。它基于经过修改的32轮Feistel结构。它使用长度为80位的密钥和长度为64位的消息块。在这封信中,我们研究了原始文章中给出的安全性论点,并表明可以通过构造22轮相关的关键不可能差异攻击来改善原始文章在20轮中给出的不可能差异攻击,该攻击依赖于以下方面的固有弱点关键时间表。使用2〜(47)个纯文本,此攻击的复杂度为2〜(70)个密码运算。该结果已经发表在Minier和Naya-Plasencia(2011)[9]中。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号