对DES的Rectangle攻击和Boomerang攻击
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant No.90604036 (国家自然科学基金); the National Basic Research Program of China under Grant No.2004CB318004 (国家重点基础研究发展计划(973)); the National High-Tech Research and Development Plan of China under Grant No.2007AA01Z470 (国家高技术研究发展计划(863))


Rectangle and Boomerang Attacks on DES
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [10]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    作为加密标准,DES(data encryption standard)算法虽然已被AES(advanced encryption standard)算法所取代,但其仍有着不可忽视的重要作用.在一些领域,尤其是金融领域,DES和Triple DES仍被广泛使用着.而近年来又提出了一些新的密码分析方法,其中,Rectangle攻击和Boomerang攻击已被证明是非常强大而有效的.因此,有必要重新评估DES算法抵抗这些新分析方法的能力.研究了DES算法针对Rectangle攻击和Boomerang攻击的安全性.利用DES各轮最优差分路径及其概率,分别得到了对12轮DES的Rectangle攻击和对11轮DES的Boomerang攻击.攻击结果分别为:利用Rectangle攻击可以攻击到12轮DES,数据复杂度为262个选择明文,时间复杂度为242次12轮加密;利用Boomerang攻击可以攻击到11轮DES,数据复杂度为258个适应性选择明密文,时间复杂度为238次11轮加密.由于使用的都是DES各轮的最优差分路径,所以可以相信,该结果是Rectangle攻击和Boomerang攻击对DES所能达到的最好结果.

    Abstract:

    In spite of being replaced by AES (advanced encryption standard), DES (data encryption standard) still plays an important role as encryption standard. DES and the triple DES are still widely used in many areas, especially in the financial sector. Recently, some new cryptanalytic techniques are introduced and of which the Rectangle attack and the Boomerang attack had proved to be very powerful. Therefore, it is necessary to re-evaluate the effects that these new cryptanalytic techniques may have on DES. This paper examines the strength of DES against the Rectangle attack and the Boomerang attack. By using the best differential characteristic of DES, the paper gets an attack against up to 12-round DES using the Rectangle attack and an attack against 11-round DES using the Boomerang attack respectively. The Rectangle attack on 12-round DES requires 262 chosen plaintexts and the time complexity is equivalent to 242 12-round encryptions, while the Boomerang attack on 11-round DES requires 258 adaptive chosen plaintexts and ciphertexts and the time complexity is equivalent to 238 11-round encryptions. Because the differential characteristics used in the attacks are all the best ones, it is believed that the attacks are the best results that the Rectangle attack and the Boomerang attack can get on DES.

    参考文献
    [1] Data Encryption Standard (DES). Federal information processing standards publication (FIPS PUB) 46-3. National Bureau of Standards. 1999. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
    [2] Biham E, Shamir A. Differential cryptanalysis of the full 16-Round DES. In: Brickell EF, ed. Proc. of the CRYPTO’92. LNCS 740, Berlin: Springer-Verlag, 1993. 487-496.
    [3] Matsui M. The first experimental cryptanalysis of the data encryption standard. In: Desmedt YG, ed. Proc. of the CRYPTO’94. LNCS 839, Berlin: Springer-Verlag, 1994. 1-11.
    [4] Biham E, Dunkelman O, Keller N. The Rectangle attack—rectangling the serpent. In: Pfitzmann B, ed. Proc. of the EUROCRYPT 2001. LNCS 2045, Berlin: Springer-Verlag, 2001. 340-357.
    [5] Wagner D. The Boomerang attack. In: Knudsen L, ed. Proc. of the Fast Software Encryption 1999. LNCS 1636, Berlin: Springer-Verlag, 1999. 156-170.
    [6] Biham E, Dunkelman O, Keller N. Related-Key Boomerang and Rectangle attacks. In: Cramer R, ed. Proc. of the EUROCRYPT 2005. LNCS 3494, Berlin: Springer-Verlag, 2005. 507-525.
    [7] Biham E, Dunkelman O, Keller N. A related-key Rectangle attack on the full KASUMI. In: Roy B, ed. Proc. of the ASIACRYPT 2005. LNCS 3788, Berlin: Springer-Verlag, 2005. 443-461.
    [8] Kelsey J, Kohno T, Schneier B. Amplified Boomerang attacks against reduced-round MARS and serpent. In: Schneier B, ed. Proc. of the Fast Software Encryption 2000. LNCS 1978, Berlin: Springer-Verlag, 2001. 75-93.
    [9] Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems (extended abstract). In: Menezes AJ, Vanstone SA, eds. Proc. of the CRYPTO’90. LNCS 537, Berlin: Springer-Verlag, 1991. 2-21.
    [10] Matsui M. On correlation between the order of S-boxes and the strength of DES. In: Santis A, ed. Proc. of the EUROCRYPT’94. LNCS 950, Berlin: Springer-Verlag, 1995. 366-375.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

张 蕾,吴文玲.对DES的Rectangle攻击和Boomerang攻击.软件学报,2008,19(10):2659-2666

复制
分享
文章指标
  • 点击次数:4640
  • 下载次数: 6275
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2007-03-23
  • 最后修改日期:2007-06-07
文章二维码
您是第19987700位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号