加入收藏夹
联系我们
关于本站
个人主页
西电导航
西安电子科技大学
    当前位置:首页>>学术讲座
Generalized Nonlinear Invariant Attack and its Application
时间:2018-04-10 17:08    点击:   所属单位:通信工程学院
讲座名称 Generalized Nonlinear Invariant Attack and its Application
讲座时间 2018-04-12 16:10:00
讲座地点 北校区新科技楼1012会议室
讲座人 韦永壮 教授
讲座人介绍

韦永壮,博士、教授、博士生导师。2009年12月毕业于西安电子科技大学密码学专业,获军事学博士学位(师从胡予濮教授)。2011年至2015年间:曾在中国科学院软件研究所从事博士后研究;随后获国家留学基金委项目资助到赫瑞瓦特大学(英国)进行一年的学术访问。2016年至今为桂林电子科技大学计算机与信息安全学院教授。目前主要研究方向:对称密码算法设计与分析、密码芯片安全防护技术。主要学术兼职:中国密码学会算法专委会委员、美国数学杂志《数学评论》(Mathematical Reviews)评论员、担任国内外权威期刊:Information Sciences、IEEE Transactions on Wireless Communications等的评审人。目前正在主持承担国家自然科学基金(面上)项目1项,广西自然科学基金(杰出青年基金)项目1项等。发表学术论文50余篇,其中SCI、EI收录30余篇,包含多篇论文发表在本领域重要刊物IEEE Transactions on Information Theory.

讲座内容 The nonlinear invariant attack was introduced at ASIACRYPT 2016 by Todo et al. The attack has received extensive attention owing to its practicality of attacking full-round SCREAM, iSCREAM, and Midori64 block ciphers under certain weak-key classes. However, the attack is heavily limited to round constants of a concerned block cipher, and the attack cannot work if the nonlinear terms of nonlinear invariants are crossed with the nonzero bit positions of the round constants of the concerned block cipher. In this talk, a generalized nonlinear invariant attack is proposed, which uses a pair of constants in the input of nonlinear invariants to eliminate the impact from the round constants. Moreover, a new framework for the generalized nonlinear invariant attack on substitution-permutation network block ciphers is investigated, and a distinguishing attack on the full-round iSCREAM cipher under a class of 296 + 280 weak keys is presented as an application example, where the class of weak keys is different from the previously known classes of weak keys. Furthermore, resistance against the generalized nonlinear invariant attack (under a more general framework) with regard to choosing round constants is discussed, and the conception of the closed-loop invariants of S-box is introduced. It is shown that the choice of robust round constants is closely related to the nonlinear terms of the closed-loop invariants of S-boxes used, by taking a variant of the Midori64 block cipher as a practical example.
转载请注明出处:西安电子科技大学学术信息网
如果您有学术信息或学术动态,欢迎投稿。我们将在第一时间确认并收录,投稿邮箱: meeting@xidian.edu.cn
Copyright © 2011-2018 西安电子科技大学 
开发维护:电子工程学院网络信息中心  管理员:meeting@xidian.edu.cn 站长统计: