基于差分分布表的密码分析方法研究
Research on Cryptanalysis Method Based on Differential Distribution Table
DOI: 10.12677/SEA.2023.121005, PDF,    科研立项经费支持
作者: 罗 昊, 王心怡, 李 晶:哈尔滨师范大学计算机科学与信息工程学院,黑龙江 哈尔滨
关键词: 分组密码差分分布表安全性分析Block Cipher Differential Distribution Table Security Analysis
摘要: 随着5G、边缘计算、雾计算等前沿技术的快速发展,大量的敏感信息由物联网设备存储、处理和发送,数据传输安全性由此面临巨大的挑战。而实现安全可靠的传输必须有一套优良的分组密码算法作为基础,差分分布表(Differential Distribution Table, DDT)因其在设计、修改和攻击轻量级分组密码等方面的优势,逐渐成为研究的热点。本文首先介绍了差分分布表的理论构建基础。然后,根据应用场景不同分别从Feistel、SPN、ARX三种结构进行细致的划分,讨论了差分分布表在密码算法安全性分析中的重要性。最后,展望差分分布表DDT在未来的研究方向,为后续研究提供参考借鉴。
Abstract: With the rapid development of cutting-edge technologies such as 5G, edge computing, and fog computing, a large amount of sensitive information is stored, processed, and sent by IoT devices, and data transmission security is therefore facing huge challenges. To achieve safe and reliable transmission, a set of excellent block cipher algorithms must be used as the basis. Differential Distribution Table (DDT) has gradually become a research hotspot due to its advantages in designing, modifying and attacking lightweight block ciphers. This paper analyzes the common attack methods of block ciphers based on differential distribution table DDT. First, the theoretical foundation of the differential distribution table is introduced. Secondly, according to different application scenarios, the three structures of Feistel, SPN, and ARX are carefully divided, and the importance of differential distribution tables in the security analysis of cryptographic algorithms is discussed. Finally, the future research direction of differential distribution table DDT is prospected, which provides reference for follow-up research.
文章引用:罗昊, 王心怡, 李晶. 基于差分分布表的密码分析方法研究[J]. 软件工程与应用, 2023, 12(1): 45-50. https://doi.org/10.12677/SEA.2023.121005

参考文献

[1] 罗守山. 密码学与信息安全技术[M]. 北京: 北京邮电大学出版社, 2009: 45-50.
[2] Lee, T.R., et al. (2021) Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes. IEEE Access, 9, 134052-134064. [Google Scholar] [CrossRef
[3] Bagane, P.A. and Sirbi, K. (2020) Bibliometric Survey for Cryptanalysis of Block Ciphers towards Cyber Security. Library Philosophy and Practice, 1-18.
[4] Guo, H., Sun, S., Shi, D., Sun, L., Sun, Y., Hu, L. and Wang, M. (2020) Differential Attacks on CRAFT Exploiting the Involutory s-Boxes and Tweak Additions. IACR Transactions on Symmetric Cryptology, 2020, 119-151. [Google Scholar] [CrossRef
[5] Biham, E. and Shamir, A. (1991) Differential Cryptanalysis of DES-Like Cryptosystems. Journal of Cryptology, 4, 3-72. [Google Scholar] [CrossRef
[6] Lai, X., Massey, J.L. and Murphy, S. (1991) Markov Ciphers and Differential Cryptanalysis. In: Workshop on the Theory and Application of Cryptographic Techniques, Springer, Berlin, 17-38. [Google Scholar] [CrossRef
[7] Daemen, J. and Rijmen, V. (2002) The Design of Rijndeal. AES—The Advanced Encryption. Springer-Verlag, Berlin.
[8] Hadipour, H., Bagheri, N. and Song, L. (2021) Improved Rectangle Attacks on SKINNY and CRAFT. IACR Transactions on Symmetric Cryptology, 2021, 140-198. [Google Scholar] [CrossRef
[9] Sehrawat, D. and Gill, N.S. (2018) Lightweight Block Ciphers for IoT Based Applications: A Review. International Journal of Applied Engineering Research, 13, 2258-2270.
[10] Dey, S. and Ghosh, R. (2018) A Review of Existing 4-bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-Boxes. Advances in Pure Mathematics, 8, 272. [Google Scholar] [CrossRef
[11] Tentu, A.N. (2020) A Review on Evolution of Symmetric Key Block Ciphers and Their Applications. IETE Journal of Education, 61, 34-46. [Google Scholar] [CrossRef
[12] Dehnavi, S.M. (2018) Further Observations on SIMON and SPECK Block Cipher Families. Cryptography, 3, 1. [Google Scholar] [CrossRef
[13] Bar-On, A., Dunkelman, O., Keller, N. and Weizman, A. (2019) DLCT: A New Tool for Differential-Linear Cryptanalysis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Springer, Berlin, 313-342. [Google Scholar] [CrossRef
[14] Fan, T., Li, L., Wei, Y. and Pasalic, E. (2022) Differential Cryptanalysis of Full-Round ANU-II Ultra-Lightweight Block Cipher. International Journal of Distributed Sensor Networks, 18, 15501329221119398-15501329221119398. [Google Scholar] [CrossRef
[15] Teh, J.S. and Biryukov, A. (2022) Differential Cryptanalysis of WARP. Journal of Information Security and Applications, 70, Article ID: 103316. [Google Scholar] [CrossRef
[16] Zhang, K., Lai, X., Guan, J. and Hu, B. (2022) Research on the Security Level of µ2 against Impossible Differential Cryptanalysis. KSII Transactions on Internet and Information Systems (TIIS), 16, 972-985. [Google Scholar] [CrossRef
[17] Zhang, P. and Zhang, W. (2018) Differential Cryptanalysis on Block Cipher Skinny with MILP Program. Security and Communication Networks, 2018, Article ID: 3780407. [Google Scholar] [CrossRef
[18] Cao, M. and Zhang, W. (2019) Related-Key Differential Cryptanalysis of the Reduced-Round Block Cipher GIFT. IEEE Access, 7, 175769-175778. [Google Scholar] [CrossRef
[19] Ji, F., Zhang, W., Zhou, C. and Ding, T. (2020) Improved (Related-Key) Differential Cryptanalysis on GIFT. In: International Conference on Selected Areas in Cryptography (ICSAC), Springer, Berlin, 198-228. [Google Scholar] [CrossRef
[20] Kousalya, R. (2021) Security Analysis against Differential Cryptanalysis Using Active S-Boxes. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12, 701-709.
[21] Hu, K., Peyrin, T. and Wang, M. (2022) Finding All Impossible Differentials When Considering the DDT. Cryptology ePrint Archive.
[22] Dwivedi, A.D. and Srivastava, G. (2018) Differential Cryptanalysis of Round-Reduced LEA. IEEE Access, 6, 79105-79113. [Google Scholar] [CrossRef
[23] Liu, Z., Li, Y., Jiao, L. and Wang, M. (2020) A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IEEE Transactions on Information Theory, 67, 1054-1068. [Google Scholar] [CrossRef
[24] Benamira, A., Gerault, D., Peyrin, T. and Tan, Q.Q. (2021) A Deeper Look at Machine Learning-Based Cryptanalysis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Springer, Berlin, 805-835. [Google Scholar] [CrossRef
[25] Pal, D., Mandal, U., Chaudhury, M., Das, A. and Chowdhury, D.R. (2022) A Deep Neural Differential Distinguisher for ARX Based Block Cipher. Cryptology ePrint Archive.