电子学报 ›› 2016, Vol. 44 ›› Issue (8): 1837-1844.DOI: 10.3969/j.issn.0372-2112.2016.09.010

• 学术论文 • 上一篇    下一篇

CIKS-128分组算法的相关密钥-差分攻击

郭建胜1,2, 崔竞一1, 罗伟3, 刘翼鹏1   

  1. 1. 解放军信息工程大学, 河南郑州 450004;
    2. 信息保障技术重点实验室, 北京 100000;
    3. 7817部队, 四川成都 611843
  • 收稿日期:2014-12-24 修回日期:2015-06-24 出版日期:2016-08-25 发布日期:2016-08-25
  • 通讯作者: 崔竞一
  • 作者简介:郭建胜 男,1972年出生,河南沁阳人,博士,解放军信息工程大学教授、博士生导师,主要研究方向为密码学和信息安全.E-mail:tsg_31@126.com
  • 基金资助:
    博士后科学基金(No.2014M562582)

Related-Key Differential Attack on Block Cipher CIKS-128

GUO Jian-sheng1,2, CUI Jing-yi1, LUO Wei3, LIU Yi-peng1   

  1. 1. The PLA Information Engineering University, Zhengzhou, Henan 450004, China;
    2. Science and Technology on Information Assurance Laboratory, Beijing 100000, China;
    3. The Unit of 78179, Chengdu, Sichuan, 611843, China
  • Received:2014-12-24 Revised:2015-06-24 Online:2016-08-25 Published:2016-08-25

摘要: 分析研究了CIKS-128分组密码算法在相关密钥-差分攻击下的安全性.利用DDP结构和非线性函数的差分信息泄漏规律构造了一条高概率相关密钥-差分特征,并给出攻击算法,恢复出了192bit密钥;在此基础上,对剩余64bit密钥进行穷举攻击,恢复出了算法的全部256bit密钥.攻击所需的计算复杂度为277次CIKS-128算法加密,数据复杂度为277个相关密钥-选择明文,存储复杂度为225.4字节存储空间.分析结果表明,CIKS-128算法在相关密钥-差分攻击条件下是不安全的.

关键词: 分组密码, 密码分析, CIKS-128分组算法, 相关密钥-差分攻击

Abstract: The security of CIKS-128 block cipher under related-key differential attack was studied.A related-key differential of high probability was constructed with the differential information leakages in the structure of DDPs and nonlinear functions.By proposing a corresponding key recovery attack based on the related-key differential,the master key of 192 bits was recovered.The rest 64 bits of the master key could be obtained by exhaustive search.The computational complexity,the data complexity and the memory complexity are 277 CIKS-128 block cipher encryptions,277 chosen-plaintexts and 225.4 bytes of storage resources,respectively.Analysis results show that CIKS-128 is unsafe under related-key differential attack.

Key words: block cipher, cryptanalysis, CIKS-128, related-key differential attack

中图分类号: