| 注册
首页|期刊导航|密码学报|REESSE3+算法抵抗差分攻击的分析*

REESSE3+算法抵抗差分攻击的分析*

董大强 殷新春 苏盛辉

密码学报2016,Vol.3Issue(5):516-526,11.
密码学报2016,Vol.3Issue(5):516-526,11.DOI:10.13868/j.cnki.jcr.000148

REESSE3+算法抵抗差分攻击的分析*

Analysis of REESSE3+ Against Differential Cryptanalysis

董大强 1殷新春 1苏盛辉1

作者信息

  • 1. 扬州大学信息工程学院,扬州 225100
  • 折叠

摘要

Abstract

REESSE3+ is an 8 rounds block cipher proposed by Su Sheng-Hui in 2014. Because REESSE3+ is inspired by IDEA which is proposed by Lai Xue-Jia, both of the algorithms use three incompatible group operations to insure their security, so we use the Markov model proposed by Lai Xue-Jia to prove the security of REESSE3+ when it comes to differential cryptanalysis. Markov model gives the security of the Markov cipher or the rounds of it by using the transition matrix or the Markov chain. In this paper, we first give the definition of REESSE3+(m). Then we prove that REESSE3+ is a Markov cipher. And we give an algorithm to get the transition matrix of REESSE3+(16). By using the transition matrix of REESSE3+(16), we prove that only after 16 rounds of iteration REESSE3+(16) can be secure against differential cryptanalysis, which means that REESSE3+ is insecure when the plaintext is 16 bits after 8 rounds of iteration. Then we prove that the transition matrix of REESSE3+ is non-symmetric and the Markov chain of it is irreducible. We show that IDEA also has these features, then we draw a conclusion that REESSE3+ is secure against differential cryptanalysis after 16 rounds of iteration. However, the security of REESSE3+ after 8 rounds is still unknown.

关键词

REESSE3+算法/差分攻击/马尔可夫密码/分组密码

Key words

REESSE3+/differential cryptanalysis/Markov cipher/block cipher

分类

信息技术与安全科学

引用本文复制引用

董大强,殷新春,苏盛辉..REESSE3+算法抵抗差分攻击的分析*[J].密码学报,2016,3(5):516-526,11.

基金项目

国家自然科学基金项目(61472343) (61472343)

密码学报

OACSCDCSTPCD

2095-7025

访问量0
|
下载量0
段落导航相关论文