密码学报2016,Vol.3Issue(5):516-526,11.DOI:10.13868/j.cnki.jcr.000148
REESSE3+算法抵抗差分攻击的分析*
Analysis of REESSE3+ Against Differential Cryptanalysis
摘要
Abstract
REESSE3+ is an 8 rounds block cipher proposed by Su Sheng-Hui in 2014. Because REESSE3+ is inspired by IDEA which is proposed by Lai Xue-Jia, both of the algorithms use three incompatible group operations to insure their security, so we use the Markov model proposed by Lai Xue-Jia to prove the security of REESSE3+ when it comes to differential cryptanalysis. Markov model gives the security of the Markov cipher or the rounds of it by using the transition matrix or the Markov chain. In this paper, we first give the definition of REESSE3+(m). Then we prove that REESSE3+ is a Markov cipher. And we give an algorithm to get the transition matrix of REESSE3+(16). By using the transition matrix of REESSE3+(16), we prove that only after 16 rounds of iteration REESSE3+(16) can be secure against differential cryptanalysis, which means that REESSE3+ is insecure when the plaintext is 16 bits after 8 rounds of iteration. Then we prove that the transition matrix of REESSE3+ is non-symmetric and the Markov chain of it is irreducible. We show that IDEA also has these features, then we draw a conclusion that REESSE3+ is secure against differential cryptanalysis after 16 rounds of iteration. However, the security of REESSE3+ after 8 rounds is still unknown.关键词
REESSE3+算法/差分攻击/马尔可夫密码/分组密码Key words
REESSE3+/differential cryptanalysis/Markov cipher/block cipher分类
信息技术与安全科学引用本文复制引用
董大强,殷新春,苏盛辉..REESSE3+算法抵抗差分攻击的分析*[J].密码学报,2016,3(5):516-526,11.基金项目
国家自然科学基金项目(61472343) (61472343)