Font Size: a A A

Effectiveness Analysis Of Boomerang Model Using Full Distribution Tests

Posted on:2020-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:X DengFull Text:PDF
GTID:2518305762971069Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid improvement of computer technology and Internet of Things,the prob-lems about information security become the important issue which every country pay more attention on.Cryptography is the cornerstone of information security and plays an impor-tant role for it.Block ciphers,as the primitives,have been widely used in Cryptography and also are the significant part for protecting information security.However,due to the revolution of the carrier of information,block cipher cannot satisfy the requirement of modern hardware for it's enormous calculation.Therefore,lightweight block cipher was created for solving the challenge.Not only lightweight block cipher can run efficiently in the computing resource constrained environment or micro devices,but also can ensure secu-rity.Nowadays,many lightweight block ciphers are presented in succession.For example,PRESENT,LBlock,TWINE,etc.In the against method for Block cipher,mainly differential attack and linear attack.And Boomerang attack combines both two attacks.This type of jointing more kinds of attacks becomes the cryptography analysis's mainstream.The boomerang model's basic idea is that using two short truncated differential paths to combine a long and has a higher probability differential path,which provides an effective way to analyze more rounds for cipher.In this article,we make a detailed research on lightweight cipher by using boomerang model.Based on this fact that calculating the real full distribution is impossible in common computer,researchers always make conclusions from theoretical aspect,which lacks experi-mental supports.In this paper,we design the theoretical and practical algorithms based on SP-network cipher(PRESENT)and Boomerang model to generate full distribution which is based on big data experiment and analyze the gap between theory and practice.We ap-propriately set the plaintext difference and key difference to acquire SPN cipher's relative differential paths.Notability,We also found a important characteristic in boomerang model,which is ignored by some researches and is vital for theoretical analysis.
Keywords/Search Tags:Block cipher, Differential analysis, SP-network, Boomerang attack, Pratice and theory
PDF Full Text Request
Related items