• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

针对 [公式:见文本] 的弱密钥和密钥恢复攻击。

Weak-keys and key-recovery attack for [Formula: see text].

机构信息

Department of Computer Science, Chennai Mathematical Institute, Chennai, India.

Department of Computer Science, Indian Institute of Technology Kanpur, Kanpur, India.

出版信息

Sci Rep. 2022 Sep 29;12(1):16313. doi: 10.1038/s41598-022-19046-2.

DOI:10.1038/s41598-022-19046-2
PMID:36175451
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9522731/
Abstract

In this paper, we study NIST lightweight 3rd round candidate [Formula: see text]. The core component of [Formula: see text] is the keyed permutation [Formula: see text], which is based on a non-linear feedback shift register. By analysing this permutation carefully, we are able to find good cubes that are used to build distinguishers in the weak-key setting. In particular, we show that there are at least [Formula: see text] keys for which TinyJAMBU can be distinguished from a random source for up to 476 rounds. These distinguishers outperform the best-known distinguishers, which were proposed in 'Scientific Reports - Nature' by Teng et al. We are the first to study the exact degree of the feedback polynomial [Formula: see text] in the nonce variables. This helped us in concluding that [Formula: see text] with more than 445 rounds is secure against distinguishers using 32 sized cubes in the normal setting. Finally, we give new key-recovery attacks against [Formula: see text] using the concepts of monomial trail presented by Hu et al. at ASIACRYPT 2020. Our attacks are unlikely to jeopardise the security of the entire 640 rounds [Formula: see text], but we strongly anticipate that they will shed new lights on the cipher's security.

摘要

在本文中,我们研究了 NIST 轻量级第三轮候选算法[Formula: see text]。[Formula: see text]的核心组件是基于非线性反馈移位寄存器的密钥置换[Formula: see text]。通过仔细分析这个置换,我们能够找到用于在弱密钥设置中构建区分器的好立方体。特别是,我们表明,对于至少[Formula: see text]个密钥,TinyJAMBU 可以与随机源区分开,最多可达 476 轮。这些区分器优于由 Teng 等人在“自然科学报告”中提出的最佳已知区分器。我们是第一个研究非零阶变量中反馈多项式[Formula: see text]的确切阶数的人。这有助于我们得出结论,在正常设置下,使用 32 大小的立方体的区分器,[Formula: see text]超过 445 轮是安全的。最后,我们使用 Hu 等人在 ASIACRYPT 2020 上提出的单项式轨迹的概念对[Formula: see text]进行了新的密钥恢复攻击。我们的攻击不太可能危及整个 640 轮[Formula: see text]的安全性,但我们强烈预计,它们将为密码的安全性提供新的思路。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/8bbf95fde399/41598_2022_19046_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/5e25ee809e38/41598_2022_19046_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/3976d44e983d/41598_2022_19046_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/09bcaa25b5c9/41598_2022_19046_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/6e903cac20c1/41598_2022_19046_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/81fa84e97ec0/41598_2022_19046_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/8bbf95fde399/41598_2022_19046_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/5e25ee809e38/41598_2022_19046_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/3976d44e983d/41598_2022_19046_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/09bcaa25b5c9/41598_2022_19046_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/6e903cac20c1/41598_2022_19046_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/81fa84e97ec0/41598_2022_19046_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/27b2/9522731/8bbf95fde399/41598_2022_19046_Fig6_HTML.jpg

相似文献

1
Weak-keys and key-recovery attack for [Formula: see text].针对 [公式:见文本] 的弱密钥和密钥恢复攻击。
Sci Rep. 2022 Sep 29;12(1):16313. doi: 10.1038/s41598-022-19046-2.
2
Cube attacks on round-reduced TinyJAMBU.对简化轮数的TinyJAMBU的魔方攻击
Sci Rep. 2022 Mar 29;12(1):5317. doi: 10.1038/s41598-022-09004-3.
3
A new distinguishing attack on reduced round ChaCha permutation.对简化轮次ChaCha置换的一种新的区分攻击。
Sci Rep. 2023 Aug 26;13(1):13958. doi: 10.1038/s41598-023-39849-1.
4
A polynomial approximation to an exponential growth function for calculating equilibrium dose in CT.一种用于计算 CT 中平衡剂量的指数增长函数的多项式逼近。
Phys Med Biol. 2020 Oct 16;65(20):20NT01. doi: 10.1088/1361-6560/abb02d.
5
Statistical deferred weighted [Formula: see text]-summability and its applications to associated approximation theorems.统计延迟加权[公式:见正文]-可和性及其在相关逼近定理中的应用。
J Inequal Appl. 2018;2018(1):65. doi: 10.1186/s13660-018-1650-x. Epub 2018 Mar 27.
6
Existence of entire solutions of some non-linear differential-difference equations.一些非线性微分差分方程整函数解的存在性
J Inequal Appl. 2017;2017(1):90. doi: 10.1186/s13660-017-1368-1. Epub 2017 Apr 27.
7
The structure of infinitesimal homeostasis in input-output networks.输入输出网络中微观平衡结构。
J Math Biol. 2021 May 21;82(7):62. doi: 10.1007/s00285-021-01614-1.
8
A weak instrument [Formula: see text]-test in linear IV models with multiple endogenous variables.具有多个内生变量的线性IV模型中的弱工具变量[公式:见正文]-检验。
J Econom. 2016 Feb;190(2):212-221. doi: 10.1016/j.jeconom.2015.06.004.
9
Data Modeling With Polynomial Representations and Autoregressive Time-Series Representations, and Their Connections.基于多项式表示和自回归时间序列表示的数据建模及其联系。
IEEE Access. 2020 Jun 8;8:110412-110424. doi: 10.1109/ACCESS.2020.3000860. eCollection 2020.
10
On the resistance of new lightweight block ciphers against differential cryptanalysis.论新型轻量级分组密码对差分密码分析的抗性
Heliyon. 2023 Apr 6;9(4):e15257. doi: 10.1016/j.heliyon.2023.e15257. eCollection 2023 Apr.

本文引用的文献

1
Cube attacks on round-reduced TinyJAMBU.对简化轮数的TinyJAMBU的魔方攻击
Sci Rep. 2022 Mar 29;12(1):5317. doi: 10.1038/s41598-022-09004-3.