• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (03): 524-528.

• 论文 • 上一篇    下一篇

E2算法的中间相遇攻击

官翔1,魏悦川1,杨晓元1,2   

  1. (1.武警工程大学电子技术系网络与信息安全武警部队重点实验室,陕西 西安 710086;
    2.武警工程大学信息安全研究所,陕西 西安 710086)
  • 收稿日期:2013-11-14 修回日期:2014-01-02 出版日期:2015-03-25 发布日期:2015-03-25
  • 基金资助:

    国家自然科学基金资助项目(61272492,61202492)

Meet-in-the-middle attacks on E2   

GUAN Xiang1,WEI Yuechuan1,YANG Xiaoyuan 1,2   

  1. (1.Key Laboratory of Network & Information Security under the Chinese Armed Police Force,
    Department of Electronic,Engineering College of the Armed Police Force,Xi’an 710086;
    2.Institute of Information Security,Engineering College of Chinese Armed Police Force,Xi’an 710086,China)
  • Received:2013-11-14 Revised:2014-01-02 Online:2015-03-25 Published:2015-03-25

摘要:

作为AES的候选算法,E2算法由于其特殊的两层SP结构一直是人们研究的热点。研究了E2算法抵抗中间相遇攻击的能力。基于E2算法的结构,利用中间相遇的思想设计了一个4轮区分器,利用该区分器,对E2算法进行了5轮、6轮中间相遇攻击。研究结果表明,E2128算法对于5轮中间相遇攻击以及E2256算法对于6轮中间相遇攻击是不抵抗的。这是首次用中间相遇的攻击方法对E2算法进行的分析,相对于已有的结果,该方法降低了所用数据复杂度。

关键词: 分组密码, 中间相遇攻击, E2, 攻击复杂度

Abstract:

As a candidate of AES, E2 algorithm has attracted wide attention because of its unique two SP structures. We evaluate the security of E2 block cipher against meet-in-the-middle attacks. Based on the idea of meet-in-the-middle, by analyzing the feathers of E2 algorithm, a 4-round distinguisher is designed. Using the distinguisher, some meet-in-the-middle attacks are made on 5/6round E2128/256. It is shown that the E2-128 algorithm to 5-round and the E2-256 algorithm to 6-round are not immune to meet-in-the-middle attacks. This is the first time to use the meet-in-the-middle attacks to analyze the E2 algorithm. Compared with  the existing results, data complexity is reduced.

Key words: block cipher;meet-in-the-middle attack;E2;attack complexity