基于SPN结构的分组密码算法ASD
An Lightweight Block Cipher ASD Based on SPN Structure
DOI: 10.12677/AAM.2022.117495, PDF,   
作者: 谢 歆:西北师范大学,数学与统计学院,甘肃 兰州
关键词: 轻量级分组密码SPN结构MILP安全性分析Lightweight Block Cipher SPN Structure MILP Security Cryptanalysis
摘要: 本文提出了一种轻量级分组密码算法ASD,该算法明文长度为64比特,密钥长度为80比特和128比特。算法整体采用SPN结构,混淆层采用16个并置的S盒运算,其中S盒为最优S盒;扩散层为PRESENT该部件的旋转。通过混合整数线性规划(MILP)寻找最小活跃S盒个数进行安全性分析,结果表明ASD具有足够的安全冗余。
Abstract: This paper proposes a lightweight block cipher algorithm ASD, which has a plaintext length of 64 bits with key length of 80 bits and 128 bits. The algorithm adopts SPN structure as a whole, and the confusion layer adopts 16 concurrent S box operations, of which the S box is the optimal S box. The diffusion layer is present for the rotation of the part. Security analysis was performed by mixed in-teger linear programming (MILP) to find the minimum number of active S boxes, and the results showed that ASD had sufficient security margins.
文章引用:谢歆. 基于SPN结构的分组密码算法ASD[J]. 应用数学进展, 2022, 11(7): 4690-4697. https://doi.org/10.12677/AAM.2022.117495

参考文献

[1] Shirai, T., Shibutani, K., Akishita, T., Moriai, S. and Iwata, T. (2007) The 128-Bit Blockcipher CLEFIA. International Workshop on Selected Areas in Cryptography, Berlin, Heidelberg, 28 March 2007, 181-195. https://linkspringer.53yu.com/chapter/10.1007/978-3-540-74619-5_12 [Google Scholar] [CrossRef
[2] Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Posch-mann, A., Robshaw, M.J. and Vikkelsoe, C. (2007) PRESENT: An Ultra-Lightweight Block Cipher. International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, Heidelberg, 10 September 2007, 450-466. https://linkspringer.53yu.com/chapter/10.1007/978-3-540-74735-2_31 [Google Scholar] [CrossRef
[3] Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M. and Todo, Y. (2017) GIFT: A Small Present. International Conference on Cryptographic Hardware and Embedded Systems, Cham, 25 August 2017, 321-345. https://linkspringer.53yu.com/chapter/10.1007/978-3-319-66787-4_16 [Google Scholar] [CrossRef
[4] Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T. and Regazzoni, F. (2015) Midori: A Block Cipher for Low Energy. International Conference on the Theory and Application of Cryptology and Information Security, Berlin, Heidelberg, 30 December 2015, 411-436. https://linkspringer.53yu.com/chapter/10.1007/978-3-662-48800-3_17 [Google Scholar] [CrossRef
[5] Biham, E. and Shamir, A. (1992). Differential Cryptanalysis of the Full 16-Round DES. Annual International Cryptology Conference, Berlin, Heidelberg, 16 August 1992, 487-496. https://linkspringer.53yu.com/chapter/10.1007/3-540-48071-4_34[CrossRef
[6] Matsui, M. (1993) Linear Cryptanalysis Method for DES Cipher. Workshop on the Theory and Application of Cryptographic Techniques, Berlin, Heidelberg, 27 May 1993, 386-397. https://linkspringer.53yu.com/chapter/10.1007/3-540-48285-7_33 [Google Scholar] [CrossRef
[7] Fu, K., Wang, M., Guo, Y., Sun, S. and Hu, L. (2016) MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. International Conference on Fast Software Encryption, Berlin, Heidelberg, 20 July 2016, 268-288. https://linkspringer.53yu.com/chapter/10.1007/978-3-662-52993-5_14 [Google Scholar] [CrossRef
[8] Leander, G. and Poschmann, A. (2007) On the Classification of 4 Bit S-Boxes. International Workshop on the Arithmetic of Finite Fields, Berlin, Heidelberg, 21 September 2007, 159-176. https://linkspringer.53yu.com/chapter/10.1007/978-3-540-73074-3_13 [Google Scholar] [CrossRef
[9] 李超. 分组密码的攻击方法与实例分析[M]//孙兵, 李瑞林. 北京: 科学出版社, 2010: 77-107.