Key-recovery attacks on LED-like block ciphers

来源 :第十二届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:boyhill
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Asymmetric cryptographic schemes represented by RSA have been shown to be insecure under the condition of quantum computers.Correspondingly,whether the symmetric cryptosystem can still ensure its high security under the condition of quantum computers is a problem that needs to be studied.In this paper,based on the basic principles of classical slide attack and Simons algorithm,we take the LED-like lightweight block ciphers as the research objects to present the security analysis under classical and quantum attacks,fully considering the influence of adding the round constants on the security of the ciphers.By analyzing the information leakage of round constants,we can introduce the differential of the round constants to propose a classical slide attack on full-round LED-64 with a probability of 1.The analysis result shows that LED-64 is unable to resist this kind of classical slide attack,but this attack method is not applicable to LED-128.As for quantum attack,by improving the existing quantum attack methods,we give quantum single-key slide attack on LED-64 and quantum related-key attack on LED-128,respectively,and indicators of the two attack algorithms are analyzed in detail.The attack results show that adding round constants does not completely improve the security of the ciphers and quantum attacks can be exponentially speed-up over the same attacks in the classical model.It further illustrates that the block cipher that is proved to be safe under classical settings is not necessarily secure under quantum computers.
其他文献
In order to solve the data security problem in cloud storage system,an access control scheme which supports for a finer attribute expression for cloud storage data based on CP-ASBE(Ciphertext-Policy A
Recently,with the rapid development of Internet of Things(IoT),vehicular ad hoc network(VANET),as a typical application of IoT,brings more and more intelligent and convenient services to an increasing
硬盘是数据最主要的存储设备,不仅在信息系统中扮演着极其重要的角色,也面临着较为严峻的安全威胁。本文对硬盘的特性及安全威胁进行了分析,对安全需求进行了总结。本文提出基于UEFI 的固件级硬盘安全保护机制,通过在加密硬盘中预置固件级硬盘安全模块,实现硬盘提供硬盘口令、全盘加密、硬盘固件度量等安全功能。最后,本文对原型系统的实验结果进行了描述。实验结果表明,在硬盘保护区内预置固件级安全模块,能够对硬盘固
椭圆曲线密码体制在资源内存受限的环境上的广泛应用,使得对其运算效率提出新的挑战,因此研究椭圆曲线标量乘算法具有重要意义.其中通过优化底层域上不同坐标系下的点加、倍点运算公式,而提高标量乘的运算效率是比较有效的方法.基于统一Z 坐标的基础上,提出有限域GF(2m)上两种射影坐标下的Co_Z 点加运算公式,通过对椭圆曲线上有理点的Z 坐标统一化处理,使得其运算量分别为10M+3S和8M+3S,相比已有
现有多服务器环境下的身份认证方案大多存在无法抵御各种安全攻击,不能实现匿名性等问题,基于扩展的混沌映射和生物特征方法提出了一种多服务器的身份认证协议,实现用户与多服务器之间的身份认证,并在认证过程中协商了会话密钥。利用BAN逻辑对提出的协议进行了安全证明。安全性分析结果表明,本文的协议可抵抗假冒攻击,离线口令猜测攻击等,并具有强匿名性。最后,与现有的相关协议比较,本文的协议更高效更安全,适合在实际
Remote authentication is a safe and verifiable mechanism.In the environment of Internet of things,remote hosts need to verify the legality of identity of terminal devices.However,resource constrained
Software vulnerabilities are weakness,flaws or errors introduced dur-ing the life cycle of a software system.Although,previous studies have demon-strated the practical significance of using software m
多播系统的保密容量受限于系统中最差用户的信道质量,并且传统的添加人工噪声的物理层安全单播技术不能直接应用于多播传输中。为了解决以上问题,提出一个基于FGS分层编码的物理层安全多播算法。该算法在保障用户不同的保密QoS需求的前提下,最大化系统保密容量。从仿真分析看,提出的次优化算法达到的系统性能十分接近最优化算法,并且计算复杂度明显降低;与此同时,提出的算法功效都大大超出了传统安全多播算法和另一种算
针对灰度图随着嵌入容量提高导致失真明显的问题,提出一种基于序列自适应分离的可逆信息隐藏算法(Reversible Data Hiding,RDH)。本算法在动态分块像素值排序算法(Pixel Value Ordering,PVO)基础上进行改进,对动态分类中的复杂像素块中可能存在的可嵌序列利用阈值判定实现自适应分离,然后对分离获得的可嵌序列进行I-PVO可逆信息嵌入。实验仿真表明,算法在嵌入容量和
Multi-copy storage can effectively improve the security of cloud storage.To resolve the problem of dynamic security audit of multi-copy data in cloud,this paper proposes a dynamic multi-copy adaptive