论文部分内容阅读
MIBS算法是由Izadi等在CANS2009上提出的一种轻量级分组密码算法,它的资源占用量较少,可以很好地应用于无线传感技术等设备资源和计算能力有限的环境中,目前对于MIBS已有许多分析结果,其中包括积分分析、差分分析、不可能差分分析、中间相遇分析等,但这些都是选择明文攻击.本文研究了轻量级分组密码算法MIBS-80抵抗相关密钥不变偏差线性分析的能力,属于已知明文攻击.利用MIBS-80密钥扩展算法的性质以及主密钥和轮密钥的关系,给出了一个密钥差分特征。结合掩码和密钥差分的特点,构造了一个9轮相关密钥不变偏差线性分析区分器,然后利用合适的线性逼近和部分和技术,对13轮的MIBS-80进行了攻击,并给出了攻击算法,能够恢复部分轮子密钥信息。攻击结果显示:攻击的数据复杂度和时间复杂度分别为2~(62.29)和2~(59.62).分析结果表明,该结果要优于已有的线性分析结果,并且此攻击方法是已知明文攻击,便于操作,易于实施.本文是第一个关于MIBS密码相关密钥不变偏差线性分析的结果,并且要优于目前已有的线性分析结果。
MIBS algorithm is a lightweight block cipher algorithm proposed by Izadi et al. On CANS2009. It has less resource consumption and can be well used in environments with limited device resources and computing power such as wireless sensor technologies. Currently, MIBS has many analysis results, including integral analysis, differential analysis, impossible differential analysis, intermediate encounter analysis, but these are selected plaintext attacks.This paper studies the lightweight block cipher algorithm MIBS-80 to resist the relevant key The ability of invariant deviation linear analysis belongs to the known plaintext attack. By using the nature of MIBS-80 key expansion algorithm and the relationship between master key and round key, a key difference feature is given. Combined with the characteristics of the mask and the key difference, a 9-round linear analysis discriminator of the key invariant deviation is constructed. Then, 13 rounds of MIBS-80 are attacked by appropriate linear approximation and part and technique Out of the attack algorithm, can recover part of the wheel key information. The attack results show that the data complexity and time complexity of attack are 2 ~ (62.29) and 2 ~ (59.62), respectively.The analysis results show that the result is better than the existing linear analysis results and the attack method is known Plaintext attack, easy to operate, and easy to implement.This article is the first to show a linear analysis of MIBS cipher-related keys, which is superior to the existing linear analysis results.