|
基于差分分布表的密码分析方法研究
|
Abstract:
随着5G、边缘计算、雾计算等前沿技术的快速发展,大量的敏感信息由物联网设备存储、处理和发送,数据传输安全性由此面临巨大的挑战。而实现安全可靠的传输必须有一套优良的分组密码算法作为基础,差分分布表(Differential Distribution Table, DDT)因其在设计、修改和攻击轻量级分组密码等方面的优势,逐渐成为研究的热点。本文首先介绍了差分分布表的理论构建基础。然后,根据应用场景不同分别从Feistel、SPN、ARX三种结构进行细致的划分,讨论了差分分布表在密码算法安全性分析中的重要性。最后,展望差分分布表DDT在未来的研究方向,为后续研究提供参考借鉴。
With the rapid development of cutting-edge technologies such as 5G, edge computing, and fog computing, a large amount of sensitive information is stored, processed, and sent by IoT devices, and data transmission security is therefore facing huge challenges. To achieve safe and reliable transmission, a set of excellent block cipher algorithms must be used as the basis. Differential Distribution Table (DDT) has gradually become a research hotspot due to its advantages in designing, modifying and attacking lightweight block ciphers. This paper analyzes the common attack methods of block ciphers based on differential distribution table DDT. First, the theoretical foundation of the differential distribution table is introduced. Secondly, according to different application scenarios, the three structures of Feistel, SPN, and ARX are carefully divided, and the importance of differential distribution tables in the security analysis of cryptographic algorithms is discussed. Finally, the future research direction of differential distribution table DDT is prospected, which provides reference for follow-up research.
[1] | 罗守山. 密码学与信息安全技术[M]. 北京: 北京邮电大学出版社, 2009: 45-50. |
[2] | Lee, T.R., et al. (2021) Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes. IEEE Access, 9, 134052-134064. https://doi.org/10.1109/ACCESS.2021.3116468 |
[3] | Bagane, P.A. and Sirbi, K. (2020) Bibliometric Survey for Cryptanalysis of Block Ciphers towards Cyber Security. Library Philosophy and Practice, 1-18. |
[4] | Guo, H., Sun, S., Shi, D., Sun, L., Sun, Y., Hu, L. and Wang, M. (2020) Differential Attacks on CRAFT Exploiting the Involutory s-Boxes and Tweak Additions. IACR Transactions on Symmetric Cryptology, 2020, 119-151.
https://doi.org/10.46586/tosc.v2020.i3.119-151 |
[5] | Biham, E. and Shamir, A. (1991) Differential Cryptanalysis of DES-Like Cryptosystems. Journal of Cryptology, 4, 3-72. https://doi.org/10.1007/BF00630563 |
[6] | Lai, X., Massey, J.L. and Murphy, S. (1991) Markov Ciphers and Differential Cryptanalysis. In: Workshop on the Theory and Application of Cryptographic Techniques, Springer, Berlin, 17-38.
https://doi.org/10.1007/3-540-46416-6_2 |
[7] | Daemen, J. and Rijmen, V. (2002) The Design of Rijndeal. AES—The Advanced Encryption. Springer-Verlag, Berlin. |
[8] | Hadipour, H., Bagheri, N. and Song, L. (2021) Improved Rectangle Attacks on SKINNY and CRAFT. IACR Transactions on Symmetric Cryptology, 2021, 140-198. https://doi.org/10.46586/tosc.v2021.i2.140-198 |
[9] | Sehrawat, D. and Gill, N.S. (2018) Lightweight Block Ciphers for IoT Based Applications: A Review. International Journal of Applied Engineering Research, 13, 2258-2270. |
[10] | Dey, S. and Ghosh, R. (2018) A Review of Existing 4-bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-Boxes. Advances in Pure Mathematics, 8, 272. https://doi.org/10.4236/apm.2018.83015 |
[11] | Tentu, A.N. (2020) A Review on Evolution of Symmetric Key Block Ciphers and Their Applications. IETE Journal of Education, 61, 34-46. https://doi.org/10.1080/09747338.2020.1769508 |
[12] | Dehnavi, S.M. (2018) Further Observations on SIMON and SPECK Block Cipher Families. Cryptography, 3, 1.
https://doi.org/10.3390/cryptography3010001 |
[13] | Bar-On, A., Dunkelman, O., Keller, N. and Weizman, A. (2019) DLCT: A New Tool for Differential-Linear Cryptanalysis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Springer, Berlin, 313-342. https://doi.org/10.1007/978-3-030-17653-2_11 |
[14] | Fan, T., Li, L., Wei, Y. and Pasalic, E. (2022) Differential Cryptanalysis of Full-Round ANU-II Ultra-Lightweight Block Cipher. International Journal of Distributed Sensor Networks, 18, 15501329221119398-15501329221119398.
https://doi.org/10.1177/15501329221119398 |
[15] | Teh, J.S. and Biryukov, A. (2022) Differential Cryptanalysis of WARP. Journal of Information Security and Applications, 70, Article ID: 103316. https://doi.org/10.1016/j.jisa.2022.103316 |
[16] | Zhang, K., Lai, X., Guan, J. and Hu, B. (2022) Research on the Security Level of μ2 against Impossible Differential Cryptanalysis. KSII Transactions on Internet and Information Systems (TIIS), 16, 972-985.
https://doi.org/10.3837/tiis.2022.03.012 |
[17] | Zhang, P. and Zhang, W. (2018) Differential Cryptanalysis on Block Cipher Skinny with MILP Program. Security and Communication Networks, 2018, Article ID: 3780407. https://doi.org/10.1155/2018/3780407 |
[18] | Cao, M. and Zhang, W. (2019) Related-Key Differential Cryptanalysis of the Reduced-Round Block Cipher GIFT. IEEE Access, 7, 175769-175778. https://doi.org/10.1109/ACCESS.2019.2957581 |
[19] | Ji, F., Zhang, W., Zhou, C. and Ding, T. (2020) Improved (Related-Key) Differential Cryptanalysis on GIFT. In: International Conference on Selected Areas in Cryptography (ICSAC), Springer, Berlin, 198-228.
https://doi.org/10.1007/978-3-030-81652-0_8 |
[20] | Kousalya, R. (2021) Security Analysis against Differential Cryptanalysis Using Active S-Boxes. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12, 701-709. |
[21] | Hu, K., Peyrin, T. and Wang, M. (2022) Finding All Impossible Differentials When Considering the DDT. Cryptology ePrint Archive. |
[22] | Dwivedi, A.D. and Srivastava, G. (2018) Differential Cryptanalysis of Round-Reduced LEA. IEEE Access, 6, 79105-79113. https://doi.org/10.1109/ACCESS.2018.2881130 |
[23] | Liu, Z., Li, Y., Jiao, L. and Wang, M. (2020) A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IEEE Transactions on Information Theory, 67, 1054-1068. https://doi.org/10.1109/TIT.2020.3040543 |
[24] | Benamira, A., Gerault, D., Peyrin, T. and Tan, Q.Q. (2021) A Deeper Look at Machine Learning-Based Cryptanalysis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Springer, Berlin, 805-835. https://doi.org/10.1007/978-3-030-77870-5_28 |
[25] | Pal, D., Mandal, U., Chaudhury, M., Das, A. and Chowdhury, D.R. (2022) A Deep Neural Differential Distinguisher for ARX Based Block Cipher. Cryptology ePrint Archive. |