• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Cui Jingyi, Guo Jiansheng, Liu Yipeng. Impossible Differential Attack on Crypton[J]. Journal of Computer Research and Development, 2017, 54(7): 1525-1536. DOI: 10.7544/issn1000-1239.2017.20160415
Citation: Cui Jingyi, Guo Jiansheng, Liu Yipeng. Impossible Differential Attack on Crypton[J]. Journal of Computer Research and Development, 2017, 54(7): 1525-1536. DOI: 10.7544/issn1000-1239.2017.20160415

Impossible Differential Attack on Crypton

More Information
  • Published Date: June 30, 2017
  • Crypton is one of the candidates of AES that designed based on Square which is a SP-network block cipher. Crypton attracts much attention of the world because of its excellent performance on hardware. The security of Crypton block cipher under impossible differential attack was studied in this paper. The properties of the diffusion layer and nonlinear layer of Crypton are analyzed and combined with the quick sort technique, the divide-and-conquer strategy, the early abort technique, the impossible differential attack on 7-round Crypton is improved with a lower data complexity and time complexity. By using 4 impossible differential distinguishers in parallel, combined with the property of key schedule, the master key of 7-round Crypton is recovered. Based on the impossible differential attack on 7-round Crypton, one more round is extended to maintain the attack on 8-round Crypton-256 to recover the 256-bit key with a data complexity of 2\+{103} chosen plaintexts, a time complexity of 2\+{214} 8-round encryptions, a memory complexity of 2\+{154.4 }B. The results show that with the usage of several techniques and the properties of Crypton, the best impossible differential attacks on Crypton are proposed in this paper known before. These techniques can also be used to analyze the other SP-network block ciphers.
  • Related Articles

    [1]Chen Ruoxi, Chen Jinyin, Zheng Haibin, Yang Xueyan, Ji Shouling, Chen Tieming. Security of Deep Neural Network Supply Chains: A Survey[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440327
    [2]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [5]Lin Hui, Tian Youliang, Xu Li, Hu Jia. A Novel Privacy Aware Secure Routing Protocol for HWMN[J]. Journal of Computer Research and Development, 2015, 52(8): 1883-1892. DOI: 10.7544/issn1000-1239.2015.20140606
    [6]Ma Zhuo, Zhang Junwei, Ma Jianfeng, and Ji Wenjiang. Provably Secure Certificateless Trusted Access Protocol for WLAN Without Pairing[J]. Journal of Computer Research and Development, 2014, 51(2): 325-333.
    [7]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [8]Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    [9]Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui. An End-to-End Authentication Protocol for Satellite Communication Network[J]. Journal of Computer Research and Development, 2013, 50(3): 540-547.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1186) PDF downloads (328) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return