论文部分内容阅读
采用相关密钥的三明治矩形攻击,改进了44轮SHACAL-2的相关密钥攻击,利用模减差分和异或差分的混合表示方式以及采用差分集合代替单个差分提高差分路线的概率,构造的35轮相关密钥三明治矩形区分器的概率为2-430。利用该区分器给出了相关密钥情况下44轮SHACAL-2的密钥恢复攻击,复杂度为2217个选择明文,2476.92次44轮SHACAL-2加密,2222字节存储。
In this paper, we improve the key attack of 44 rounds of SHACAL-2 by using the sandwich-like attack of the relevant key, and use the mixture representation of the modulo-subtraction difference and the exclusive OR difference and the probability of using the differential set instead of the single difference to improve the differential route. The probability of the wheel-related key sandwich red zone divider is 2-430. Using this discriminator, 44 round SHACAL-2 key recovery attacks with the relevant keys are given. The complexity is 2217 choices of plaintext, 2476.92 44 rounds of SHACAL-2 encryption and 2222 bytes of storage.