О слабом классе алгоритмов развёртывания ключа относительно метода связанных ключей
In this paper key-scheduling algorithmshaving the defined recurrent property are considered. For this class of algorithms we describerelated-key attacks. The complexity of the attack is equal to the exhaustive searchof one round key. It requires a little number of plaintexts.
Скачать электронную версию публикации
Загружен, раз: 221
Ключевые слова
Авторы
ФИО | Организация | Дополнительно | |
Пудовкина Марина Александровна | Московский инженерно-физический институт | кандидат физико-математических наук, доцент | maricap@yandex.ru |
Ссылки
CietM., PiretG., Quisquater J.-J. A survey of key schedule cryptanalysis / / Universite catholique de Louvain, Crypto Group, http://www.dice.ucl.ac.be/crypto/techreports. html. 2002.
Kelsey J., Schneier B., Wagner D. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES / / LNCS. 1996. No. 1109. P. 237-251.
Kelsey J., Schneier B., Wagner D. Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA / / LNCS. 1997. No. 1334. P. 233-246.
Biryukov A., Khovratovich D., Nikolid. Distinguisher and Related-Key Attack on the Full AES-256 / / LNCS. 2009. No. 5677. P. 231-249.
Biham E., Dunkelman O., Keller N. Related-key boomerang and rectangle attacks / / LNCS. 2005. No. 3494. P. 507-525.
Biham E. New Type of Cryptanalytic Attacks Using Related Key / / LNCS. 1994. No. 765. P. 229-246.
Knudsen L. R. Cryptanalysis of LOKI91 / / LNCS. 1993. No. 718. P. 196-208.
Ciet M., PiretG., Quisquater J.-J. Related-Key and Slide Attacks: Analysis, Connections, and Improvements / / http://www.dice.ucl.ac.be/~crypto.
Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си. М.: Триумф, 2002.
Blunden M., Escott A. Related Key Attacks on Reduced Round KASUMI / / LNCS. 2001. No 2355. P. 277-285.
Courtois N., Bard G. Algebraic and Slide Attacks on KeeLoq / / Cryptology ePrint Archive. 2007. Report 2007/062, 2007.
Biryukov А., Wagner D. Slide Attacks / / LNCS. 1999. No. 1636. P. 245-259.
Seki H., Kaneko T. Differential cryptanalysis of reduced rounds of gost / / Selected Areas in Cryptography. Springer, 2000. No. 2012. P. 315-323.
Biham E., Dunkelman O., Keller N. Improved slide attacks / / LNCS. 2007. No. 4593. P. 153166.
Kara O. Reflection Cryptanalysis of Some Ciphers / / LNCS. 2008. No. 5365. P. 294-307.
Ko Y., Hong S., Lee W., et al. Related key differential attacks on 27 rounds of xtea and full-round gost / / LNCS. 2004. No. 3017. P. 299-316.
Fleischmann E., Gorski M., Huhne J.-H., Lucks S. Key Recovery Attack on full GOST Block Cipher with Zero Time and Memory / / WEWoRC. 2009.
