Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2017-04
Add to Favorite Get Latest Update

Impossible Differential Cryptanalysis of Reduced-Round LBlock-s

JIA Ping;XU Hong;LAI Xue-jia;Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;Department of Computer Science & Engineering,Shanghai Jiao Tong University;  
LBlock-s is the kernel block cipher of the authentication encryption algorithm LAC submitted to CAESAR competition. The general structure of LBlock-s is almost the same as that of LBlock,but LBlock-s adopts an improved key schedule algorithm with better diffusion property. Using the shifting relation of subkeys derived by the key schedule algorithm,an impossible differential cryptanalysis on 21-round LBlock-s was presented based on a 14-round impossible differential.The time and data complexities are 2~(67.61) 21-round encryptions and 2~(63) chosen plaintexts respectively, and the number of subkey bits needed to be guessed is 72. Using partial-matching method, an impossible differential cryptanalysis on LBlock-s up to 23-round was also presented with time complexity less than exhaustion of all key bits. This work is useful for the security analysis of LAC algorithm.
【Fund】: 国家自然科学基金(No.61100200 No.61170235 No.61309017 No.61472251 No.61502524 No.61521003 No.U1536101);; 国家863高技术研究发展计划(No.2015AA01A708)
【CateGory Index】: TP309.7;;TN918.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 HUANG Yong-hong;GUO Jian-sheng;LUO Wei;Chongqing University of Posts and Telecommunications;The PIA Information Engineering University;Science and Technology on Information Assurance Laboratory;The PIA Unit 78179;;Related-Key Impossible Differential Attacks on LBlock[J];电子学报;2015-10
2 PENG Chang-yong;ZHU Chuang-ying;HUANG Li;ZHU Yue-fei;WANG Jin-hui;Cyberspace security college,PLA Information Engineering University;College of Science,PLA Information Engineering University;School of Computer and Control,Guillin University of Electronic Technology;Scientific Research Department,PLA Information Engineering University;;Formal Function Cryptanalysis of Block Cipher and Its Application[J];电子学报;2013-11
3 PENG Chang-yong1,2,ZHU Chuang-ying3,HUANG Li4,ZHU Yue-fei1,WANG Jin-hui2(1.Cyberspace Security College,PLA Information Engineering University,Zhengzhou,Henan 450002,China;2.College of Science,PLA Information Engineering University,Zhengzhou,Henan 450002,China;3.School of Computer and Control,Guillin University of Electronic Technology,Guilin,Guangxi 541004,China;4.Scientific Research Department,PLA Information Engineering University,Zhengzhou,Henan 450002,China);Extended Algebraic-Side Channel Attack and Its Application[J];电子学报;2013-05
【Co-citations】
Chinese Journal Full-text Database 2 Hits
1 GUAN Ming-Yang;YU Guo-Rui;XIANG Yi-Xi;TAN Zhao-Nian;ZHANG Guo-Shuang;WANG An;School of Computer Science, Beijing Institute of Technology;State Key Laboratory of Cryptology;Science and Technology on Information Assurance Laboratory;;Power Analysis and Protection on BBC encoding LBlock Decryption Algorithm[J];密码学报;2017-03
2 JIA Ping;XU Hong;LAI Xue-jia;Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;Department of Computer Science & Engineering,Shanghai Jiao Tong University;;Impossible Differential Cryptanalysis of Reduced-Round LBlock-s[J];电子学报;2017-04
【Secondary Citations】
Chinese Journal Full-text Database 6 Hits
1 LUO Wei,GUO Jian-sheng(The PLA Information Engineering University,Zhengzhou,Henan 450004,China);Related-Key Differential Attacks on Cobra-H64/128[J];电子学报;2013-08
2 Guo Jian-sheng① Luo Wei① Zhang Lei② Guo Yuan-bo① ①(The PLA Information Engineering University,Zhengzhou 450004,China) ②(Unit 65012 of the PLA,Shenyang 110001,China);Impossible Differential Cryptanalysis of LBlock Code[J];电子与信息学报;2013-06
3 ZHANG Wen-ying1,3,4,LIU Xiang-zhong2(1.School of Information Science and Engineering,Shandong Normal University,Jinan,Shandong 250014,China;2.No.2 Middle School Attached to Shandong Normal University,Jinan,Shandong 250014,China;3.Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan,Shandong 250014,China;4.State Key Lab of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China);An Related-Key Meet-in-the-Middle Algebraic Attack on the NLFSR Based Block Cipher KTANTAN32[J];电子学报;2012-10
4 PENG Chang-yong1,2,ZHU Yue-fei1,GU Chun-xiang1,MI Shun-qiang3(1.Institute of Information Engineering,PLA Information Engineering University,Zhengzhou 450002,China;2.School of Science,PLA Information Engineering University,Zhengzhou 450001,China;3.95833 PLA Troops,Beijing 100092,China);Polynomial Expression and Completeness Analysis of 1~5 Round LBlock[J];计算机工程;2012-09
5 LI Xin1,2,LIN Dong-dai1(1.State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China;2.Graduate School of the Chinese Academy of Sciences,Beijing 100190,China);Guessing Specific Variables in Algebraic Attacks on Bivium[J];电子学报;2011-08
6 TANG Xue-hai,SUN Bing,LI Chao(Department of Mathematics and System Science,National University of Defense Technology,Changsha,Hunan 410073,China);A Real-World Attack of 8-Round CLEFIA[J];电子学报;2011-07
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved