一种新的FeW的高阶微分

Naoki Shibayama, Y. Igarashi, T. Kaneko
{"title":"一种新的FeW的高阶微分","authors":"Naoki Shibayama, Y. Igarashi, T. Kaneko","doi":"10.1109/CANDARW.2018.00090","DOIUrl":null,"url":null,"abstract":"FeW is a 64-bit block cipher proposed by Kumar et.al in 2014. It supports 80-,and 128-bit secret keys. The designer evaluated its security against typical attack, such as differential cryptanalysis, linear cryptanalysis, and so on. On the other hand, it has not been reported the security of FeW against higher order differential attack, which is one of the algebraic attacks. In this paper, we focused on a higher order differential of FeW. By computer experiment, we found a new 6-round saturation characteristic of FeW using 28-th order differential. Introducing two concepts for higher order differential which are control transform for the input and observation transform for the output, we also show a new 9-round saturation characteristic using 60-th order differential which is a 3-round extension of the 6-round one, and estimates the costs of attack exploiting the characteristic. As a result, we show that the 12-round FeW can be attacked with 2^62.3 blocks of chosen plaintext and times of data encryption. The 14-round FeW can be attacked with 2^63.2 blocks of chosen plaintext and 2^123.3 times of data encryption.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A New Higher Order Differential of FeW\",\"authors\":\"Naoki Shibayama, Y. Igarashi, T. Kaneko\",\"doi\":\"10.1109/CANDARW.2018.00090\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"FeW is a 64-bit block cipher proposed by Kumar et.al in 2014. It supports 80-,and 128-bit secret keys. The designer evaluated its security against typical attack, such as differential cryptanalysis, linear cryptanalysis, and so on. On the other hand, it has not been reported the security of FeW against higher order differential attack, which is one of the algebraic attacks. In this paper, we focused on a higher order differential of FeW. By computer experiment, we found a new 6-round saturation characteristic of FeW using 28-th order differential. Introducing two concepts for higher order differential which are control transform for the input and observation transform for the output, we also show a new 9-round saturation characteristic using 60-th order differential which is a 3-round extension of the 6-round one, and estimates the costs of attack exploiting the characteristic. As a result, we show that the 12-round FeW can be attacked with 2^62.3 blocks of chosen plaintext and times of data encryption. The 14-round FeW can be attacked with 2^63.2 blocks of chosen plaintext and 2^123.3 times of data encryption.\",\"PeriodicalId\":329439,\"journal\":{\"name\":\"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)\",\"volume\":\"106 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CANDARW.2018.00090\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CANDARW.2018.00090","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

FeW是Kumar等人在2014年提出的64位分组密码。它支持80位和128位密钥。设计人员对其针对差分密码分析、线性密码分析等典型攻击的安全性进行了评估。另一方面,对于高阶微分攻击(一种代数攻击),FeW的安全性尚未见报道。在本文中,我们关注的是少数人的高阶微分。通过计算机实验,我们利用28阶微分找到了一种新的6轮饱和特性。引入了用于输入的控制变换和用于输出的观察变换这两个高阶微分的概念,利用60阶微分给出了一种新的9轮饱和特性,该特性是6轮饱和特性的3轮扩展,并估计了利用该特性进行攻击的代价。因此,我们证明了12轮的FeW可以用2^62.3个选择的明文块和数据加密次数进行攻击。14轮的FeW可以用2^63.2个选择的明文块和2^123.3倍的数据加密来攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A New Higher Order Differential of FeW
FeW is a 64-bit block cipher proposed by Kumar et.al in 2014. It supports 80-,and 128-bit secret keys. The designer evaluated its security against typical attack, such as differential cryptanalysis, linear cryptanalysis, and so on. On the other hand, it has not been reported the security of FeW against higher order differential attack, which is one of the algebraic attacks. In this paper, we focused on a higher order differential of FeW. By computer experiment, we found a new 6-round saturation characteristic of FeW using 28-th order differential. Introducing two concepts for higher order differential which are control transform for the input and observation transform for the output, we also show a new 9-round saturation characteristic using 60-th order differential which is a 3-round extension of the 6-round one, and estimates the costs of attack exploiting the characteristic. As a result, we show that the 12-round FeW can be attacked with 2^62.3 blocks of chosen plaintext and times of data encryption. The 14-round FeW can be attacked with 2^63.2 blocks of chosen plaintext and 2^123.3 times of data encryption.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Towards Improving Data Transfer Efficiency for Accelerators Using Hardware Compression Tile Art Image Generation Using Conditional Generative Adversarial Networks A New Higher Order Differential of FeW Non-volatile Memory Driver for Applying Automated Tiered Storage with Fast Memory and Slow Flash Storage DHT Clustering for Load Balancing Considering Blockchain Data Size
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1