MILP-Based Linear Attacks on Round-Reduced GIFT

来源 :电子学报(英文版) | 被引量 : 0次 | 上传用户:xxzjlei
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
GIFT is a lightweight block cipher with an substitution-permutation-network(SPN)structure proposed in CHES 2017.It has two different versions whose block sizes are 64 and 128 respectively.In RSA 2019,Zhu et al.found some differential characteristics of GIFT with mixed integer linear programming(MILP)method and presented corresponding differential attacks.In this paper,we further find some linear characteristics with MILP method.For GIFT-64,we find two 11-round linear characteristics with correlation 2-29,and use one of them to present a 16-round linear attack on GIFT-64 by adding 4 rounds before and one round after the linear character-istic.For GIFT-128,we find a 16-round linear character-istic with correlation 2-62.As far as we know,it is the longest linear characteristic found for GIFT-128.Using the 16-round linear characteristic,we present a 20-round linear attack on GIFT-128 by adding 2 rounds before and 2 rounds after the linear characteristic.
其他文献
Since differential fault analysis(DFA)was first implemented on data encryption standard(DES),many scholars have improved this attack and ex-tended the limit of the original last two rounds to the earlier rounds.However,the performance of the novel at-tack
This paper presents a clock-less pro-grammable pre-emphasis technique realized by a driver with combined resistive-inductive-capacitive source degen-eration for high-speed serial link transmitters.The addi-tion of a series inductive-capacitive resonance n
当前,由于主变事故油池容量不足、雨水管路直接外排、漏油人工监测和控制缺乏等原因,变电站设备漏油后不能被及时发现并得到有效控制,导致漏油事件极易转为恶劣的环境污染事件.针对该隐患,本文广泛应用物联网、通信技术、智慧传感技术,首创构建一套技术简单可靠、业务高度融合、可推广应用的变电站油泄漏三级监控系统.通过研制仿生鳍减摇结构的智能漏油监测装置,对变压器进行事故排油系统、雨水系统、运行环境的多维度实时监测,采用自动蝶阀与监测装置实时联动,实现变电站漏油智能控制,杜绝发生因变电站设备漏油外排导致的环境污染事件.
能效提升是当前低碳背景下国际学术界和产业界关注的焦点,也是推动我国能源行业转型的重要途径,更是提高全社会用户服务满意度的必然手段.我国政府高度重视能源转型及节能降耗工作,致力于构建清洁低碳、安全高效的现代能源体系.因此,能效提升和客户服务优化都是电力需求侧管理工作的核心任务,更是实现“双碳”目标的重要手段.“十四五”期间,能源电力科技领域需要进一步依托人工智能、大数据、互联网、5G等先进的信息通信技术,大力开展综合能源服务、电力需求响应、电能替代、电动汽车互动等技术的研究实践工作,广泛积累能效提升和客户能
期刊
随着移动通信网络的迅猛发展,其安全漏洞产生的影响更为广泛,使得安全性研究尤为重要.根据长期演进(Long Term Evolution,LTE)非接入层协议的漏洞,构建了针对网络端和终端的两种拒绝服务攻击模型,通过获取不同终端的国际移动用户标识并分别伪造鉴权拒绝消息和附着请求消息对目标发起不同危害程度的拒绝服务攻击.实验结果表明,采用鉴权拒绝发起的攻击会使目标终端强制降为2G网络;而采用附着请求发起的攻击会使核心网侧中央处理器(Central Processing Unit,CPU)使用率由30%提升至8
针对按频率均匀划分子信道的数字信道化技术缺乏灵活性、资源利用率低等问题,提出了一种基于信号时间-频率特征分析的自适应信道化技术.对中频数据进行时-频分析,根据信号时-频特征参数差异对子信道进行跟踪、聚类,自适应动态调整参与反变换的子信道,实现宽带复杂调制信号的完整截获、跟踪、分离.仿真分析结果验证了算法的有效性,且其计算复杂度低,可应用于现场可编程逻辑门阵列等工程实现,为复杂电磁环境下的宽带雷达信号侦察提供有力支撑.
As solid-state drives(SSD)have been widely adopted,secure data deletion becomes an essential component for ensuring user privacy,preventing sensit-ive data leakage.Due to the erase-before-write property,erasure operation and scrub operation substituting f
Radio frequency(RF)devices used in modern wireless systems must meet increasingly complic-ated spectral constraints while still operating with high power efficiency.A fast real-time two-tone active load-pull algorithm is proposed to assess the relationshi
The increasing commercialization and massive deployment of radio frequency identification(RFID)systems has raised many security related issues which in return evokes the need of security protocols.Lo-gic of events theory(LoET)is a formal method for con-st
This paper presents a low power con-sumption and low cost electrically erasable program-mable read-only memory(EEPROM)for radio frequency identification(RFID)tag chip.A read-write circuit with parallel input and serial output is proposed.Only one sensitiv