Searching method for impossible differential path of related key of block cipher

A block cipher algorithm and differential path technology, applied in the field of information security, can solve problems such as error-prone, low efficiency, and incomplete manual analysis, and achieve the effect of speeding up and speeding up analysis.

Active Publication Date: 2016-10-12
XIDIAN UNIV
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a search method for the impossible differential path of a block cipher related key, aiming to combine the related key differential search method and the impossible differential search method to solve the existing generalized Feistel structure or transformable The problem of computer automatic search for the maximum correlation key impossible differential path of block cipher algorithm with generalized Feistel structure, encryption and decryption matrix satisfying 1-property and round function satisfying bijection
The invention realizes the automatic search of the computer for the method of searching for the impossible differential path of the relevant key, does not need manual calculation to find the impossible differential path of the relevant key, and can traverse all paths, and overcomes incomplete manual analysis, error-prone, The disadvantage of low efficiency, and the ability to calculate the maximum length of the relevant key of the block cipher algorithm impossible differential path

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searching method for impossible differential path of related key of block cipher
  • Searching method for impossible differential path of related key of block cipher
  • Searching method for impossible differential path of related key of block cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037]The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0038] refer to figure 1 , the implementation steps of the present invention are as follows:

[0039] Step 1, calculate the encryption and decryption matrix of the non-generalized Feistel structure encryption algorithm

[0040] In this embodiment, the block cipher LBlock with a non-generalized Feistel structure is taken as an example for illustration. The group size of LBlock is 64bit, each 4bit is a block, the master key is 80bit, and its encryption structure refers to figure 2 . ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a searching method for an impossible differential path of a related key of a block cipher. As an impossible differential attack method and a related key attack method are combined, the problems of automatic searching of the impossible differential path of the related key and searching of a longest analysis path in cryptanalysis are solved, and deeper and more thorough analysis for a cryptographic algorithm can be carried out. According to the searching method for the impossible differential path of the related key of the block cipher, the method for searching the impossible differential path of the related key is upgraded from the traditional manual analysis to computer automatic searching, the disadvantages that an existing manual analysis method is fussy and error-prone when being used for analyzing the cryptographic algorithm are avoided, the maximum length of the impossible differential path of the related key of the block cipher algorithm can be calculated rapidly and accurately, and the cryptanalysis efficiency is improved. The searching method for the impossible differential path of the related key of the block cipher realizes transformation of the cryptographic algorithm from a non-generalized Feistel structure to a generalized Feistel structure, can be widely applied to automatic search of the impossible differential paths of related keys of various cryptographic algorithms in different structures.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a search method for an impossible differential path of a block cipher-related key. Background technique [0002] With the continuous development of technology, the role of information security has become increasingly prominent, and people's lives are inseparable from information. Cryptography, as the basis of information security, has developed rapidly. Cryptography and cryptanalysis have co-evolved, so when cryptography developed, cryptanalysis also attracted attention. However, cryptanalysis has always been mainly based on manual analysis, although some people have proposed an impossible differential search method, with the help of computer-aided cryptanalysis. Both the manual analysis method and the proposed impossible differential search method have deficiencies: [0003] 1. The manual analysis method relies entirely on the manual understanding of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0625
Inventor 谢敏牟彦利李静静裴庆祺杨盼臧越川
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products