论文部分内容阅读
SAFER + +是进入NESSIE第二轮评估的 7个算法之一 .设计者称 2 .5轮SAFER + +可以抵抗线性密码分析 .JNakahara指出对某些密钥 ,改进型线性密码分析攻击 4轮SAFER + +比强力攻击有效 .本文对SAFER + +的基础模块深入分析和测试后 ,对 5轮SAFER + +进行非线性密码分析 ;攻击对 2 2 52 个 2 5 6比特长度的密钥有效 ,攻击的数据复杂度为 2 12 0 .虽然此攻击对SAFER + +的实际安全构不成威胁 ,但是显示非线性密码分析攻击 5轮SAFER + +比强力攻击有效 ,也说明了非线性密码分析攻击 5轮SAFER + +比线性密码分析和JNakahara等的改进型线性密码分析有效
SAFER + + is one of seven algorithms to enter NESSIE’s second round of evaluation.The designer said 2.5 rounds of SAFER + + can resist linear cryptanalysis.JNakahara points out that for some keys, improved linear cryptanalysis attacks four rounds of SAFER + + Is more effective than aggressive attack.This paper performs a non-linear cryptanalysis on 5 rounds of SAFER + + after analyzing and testing the SAFER + + basic module. The attack is effective against 2252 keys with a length of 256 bytes Has a data complexity of 2 12 0. Although this attack poses no threat to the actual security of SAFER + +, it shows that the non-linear cryptanalysis attack of 5 rounds of SAFER + + is more effective than the brute force attack and also shows that the nonlinear cryptanalysis attacks 5 rounds SAFER + + is more effective than linear cryptanalysis and improved linear cryptanalysis by JNakahara et al