linear cryptanalysis of nush block cipher
文献类型:期刊论文
作者 | Wu WL ; Feng Dengguo |
刊名 | Science in China Series F
![]() |
出版日期 | 2002 |
卷号 | 45期号:1页码:59-67 |
关键词 | block cipher linear cryptanalysis linear approximation |
通讯作者 | Wu, WL (通讯作者), Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China |
收录类别 | SCI,SPRINGER |
资助信息 | IEEE Computer Society |
WOS记录号 | WOS:000176892700005 |
公开日期 | 2010-08-20 |
附注 | NUSH is a block cipher as a candidate for NESSIE. NUSH is analyzed by linear crypt-analysis. The complexity delta = (epsilon, eta) of the attack consists of data complexity epsilon and time complexity eta. Three linear approximations are used to analyze NUSH with 64-bit block. When \K\ = 128 bits, the complexities of three attacks are (2(58), 2(124)), (2(60), 2(78)) and (2(62), 2(55)) respectively. When \K\ = 192 bits, the complexities of three attacks are (2(58), 2(157)) (2(60), 2(96)) and (2(62), 2(58)) respectively. When \K\ = 256 bits, the complexities of three attacks are (2(58), 2(125)), (2(60), 2(78)) and (2(62), 2(53)) respectively. Three linear approximations are used to analyze NUSH with 128-bit block. When \K\ = 128 bits, the complexities of three attacks are (2(122), 2(95)), (2(124), 2(57)) and (2(126), 2(52)) respectively. When \K\ = 192 bits, the complexities of three attacks are (2(122), 2(142)), (2(124), 2(75)) and (2(126), 2(58)) respectively. When \K\ = 256 bits, the complexities of three attacks are (2(122), 2(168)), (2(124), 2(81)) and (2(126), 2(64)) respectively. Two linear approximations are used to analyze NUSH with 256-bit block. When \K\ = 128 bits, the complexities of two attacks are (2(252), 2(122)) and (2(254), 2(119)) respectively. When \K\ = 192 bits, the complexities of two attacks are (2(252), 2(181)) and (2(254), 2(177)) respectively. When \K\ = 256 bits, the complexities of two attacks are (2(252), 2(240)) and (2(254), 2(219)) respectively. These results show that NUSH is not immune to linear cryptanalysis, and longer key cannot enhance the security of NUSH. |
源URL | [http://124.16.136.157/handle/311060/3466] ![]() |
专题 | 软件研究所_信息安全国家重点实验室_期刊论文 |
推荐引用方式 GB/T 7714 | Wu WL,Feng Dengguo. linear cryptanalysis of nush block cipher[J]. Science in China Series F,2002,45(1):59-67. |
APA | Wu WL,&Feng Dengguo.(2002).linear cryptanalysis of nush block cipher.Science in China Series F,45(1),59-67. |
MLA | Wu WL,et al."linear cryptanalysis of nush block cipher".Science in China Series F 45.1(2002):59-67. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。