What is the effective key length for a block cipher: an attack on every practical block cipher

来源 :Science China(Information Sciences) | 被引量 : 0次 | 上传用户:cutuf
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Recently,several important block ciphers are considered to be broken by the brute-force-like cryptanalysis,with a time complexity faster than the exhaustive key search by going over the entire key space but performing less than a full encryption for each possible key.Motivated by this observation,we describe a meetin-the-middle attack that can always be successfully mounted against any practical block ciphers with success probability one.The data complexity of this attack is the smallest according to the unicity distance.The time complexity can be written as 2k(1-),where>0 for all practical block ciphers.Previously,the security bound that is commonly accepted is the length k of the given master key.From our result we point out that actually this k-bit security is always overestimated and can never be reached because of the inevitable loss of the key bits.No amount of clever design can prevent it,but increments of the number of rounds can reduce this key loss as much as possible.We give more insight into the problem of the upper bound of effective key bits in block ciphers,and show a more accurate bound.A suggestion about the relationship between the key size and block size is given.That is,when the number of rounds is fixed,it is better to take a key size equal to the block size.Also,effective key bits of many well-known block ciphers are calculated and analyzed,which also confirms their lower security margins than thought before.The results in this article motivate us to reconsider the real complexity that a valid attack should compare to. Recently, several important block ciphers are considered to be broken by the brute-force-like cryptanalysis, with a time complexity faster than the exhaustive key search by going over the entire key space but performing less than a full encryption for each possible key. Motivated by this observation, we describe a meetin-the-middle attack that can always be successfully mounted one against any practical block ciphers with success probability one the data complexity of this attack is the smallest according to the unicity distance. The time complexity can be written as 2k (1 -), where> 0 for all practical block ciphers.Previously, the security bound that is generally accepted is the length k of the given master key. From our result we point that that actually this k-bit security is always overestimated and can never be reached because of the inevitable loss of the key bits. N amount of clever design can prevent it, but increments of the number of rounds can reduce this key loss as much as possible. We give more insight into the problem of the upper bound of effective key bits in block ciphers, and show a more accurate bound. A suggestion about the relationship between the key size and block size is given. If is when the number of rounds is fixed, it is better to take a key size equal to the block size. Als, effective key bits of many well-known block ciphers are calculated and analyzed, which also confirms their lower security margins than thought before. The results in this article motivate us to reconsider the real complexity that a valid attack should compare to.
其他文献
机械设计涉及大量的模糊性知识。该文将模糊技术引入机械设计专家系统,重点探讨了机械模糊知识的表达方法和推理方法,并以圆柱齿轮减速器为例,建立了一个在总体设计阶段进行模糊
二年生白花草木樨是我国北方的主要绿肥作物之一。草木樨的利用,有当年翻压,第二年翻压及只利用根茬等方式。翻压的时间何时为好,怎样利用合适,肥田增产效果怎样,这都直接影
获得足够的有效流量@iRTM能够帮助广告主充分利用每日超过30亿PV的流量池,并且,通过多重定向手段有效锁定目标人群,对每一个目标受众进行购买。另一方面,基于RTB的受众购买模
体检查癌不靠谱  抽血化验,是大家常规体检和到医院就诊时经常做的项目。血液中的一些化验数据,的确可以有效检测判断人体是否患有某些疾病,但对于诊断是否患有癌症并不科学。一般来说完整的癌症筛查是通过多种检查手段,如病史、症状、物理检查、放射、超声、化验等,而非只靠某一项检查即可达成。体检中针对癌症的常规血检,很少能像癌症筛查测试一样精确精准。  仅仅通过血液来诊断是否患癌一直是医学上难以攻克的难题,目
期刊