• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yu Xiaoli, Wu Wenling, Li Yanjun. Integral Attack of Reduced-Round MIBS Block Cipher[J]. Journal of Computer Research and Development, 2013, 50(10): 2117-2125.
Citation: Yu Xiaoli, Wu Wenling, Li Yanjun. Integral Attack of Reduced-Round MIBS Block Cipher[J]. Journal of Computer Research and Development, 2013, 50(10): 2117-2125.

Integral Attack of Reduced-Round MIBS Block Cipher

More Information
  • Published Date: October 14, 2013
  • MIBS is a lightweight block cipher aimed at constrained resources such as RFID tags and sensor networks, which was proposed in CANS2009, by Izadi M. I. et al. There have been a few security analysis results about MIBS, such as differential analysis and linear analysis on reduced rounds of MIBS. In this paper, we give an integral attack on reduced rounds of MIBS. Firstly, a 5-round integral distinguisher of MIBS is given by considering the special property of round function. Secondly, we use the higher-order integral technology to extend the 5-round integral distinguisher by another 3-round which helps us get a better integral attack on MIBS. Finally, we attack 8-round, 9-round and 10-round MIBS using these distinguishers. Furthermore, we use partial sum technique to reduce the time complexity of the integral attack. We attack 8-round MIBS with the data complexity of 29.6 and time complexity of 235.6encryptions, attack 9-round MIBS with the data complexity of 237.6 and time complexity of 240encryptions, and attack 10-round MIBS with the data complexity of 261.6 and time complexity of 240encryptions. Moreover, the results of this paper can be applied to both MIBS-64 and MIBS-80. Finally, the higher-order integral technology can also be applied to other Feistel-SP type block cipher, which can improve the results of integral attacks.
  • Related Articles

    [1]Dong Yiqun, Liu Jiandong, Xu Wenxing, Wang Shuhong. A Reasoning Method for Qualitative Distance Change Based on OPRA\-4 Direction Relations[J]. Journal of Computer Research and Development, 2020, 57(5): 971-983. DOI: 10.7544/issn1000-1239.2020.20190442
    [2]Zheng Susu, Fu Xiaodong, Yue Kun, Liu Li, Liu Lijun, Feng Yong. Online Service Reputation Measurement Method Based on Kendall tau Distance[J]. Journal of Computer Research and Development, 2019, 56(4): 884-894. DOI: 10.7544/issn1000-1239.2019.20180034
    [3]Zhang Liping, Liu Lei, Hao Xiaohong, Li Song, Hao Zhongxiao. Voronoi-Based Group Reverse k Nearest Neighbor Query in Obstructed Space[J]. Journal of Computer Research and Development, 2017, 54(4): 861-871. DOI: 10.7544/issn1000-1239.2017.20151111
    [4]Yang Zexue, Hao Zhongxiao. Group Obstacle Nearest Neighbor Query in Spatial Database[J]. Journal of Computer Research and Development, 2013, 50(11): 2455-2462.
    [5]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [6]Jin Xin, Li Runheng, Gan Liang, Li Zhengyi. IRC Botnets’ Homology Identifying Method Based on Dynamic Time Warping Distance of Communication Feature Curves[J]. Journal of Computer Research and Development, 2012, 49(3): 481-490.
    [7]Wu Guofu, Dou Qiang, Ban Dongsong, Dou Wenhua, and Song Lei. A Novel Passive-Landmark Based Network Distance Prediction Method[J]. Journal of Computer Research and Development, 2011, 48(1): 125-132.
    [8]He Honghui, Wang Lizhen, and Zhou Lihua. pgi-distance: An Efficient Method Supporting Parallel KNN-join Process[J]. Journal of Computer Research and Development, 2007, 44(10): 1774-1781.
    [9]Lin Zhigui, Xu Lizhong, Yan Xijun, Huang Fengchen, Liu Yingping. A Decision-Making Method on D-S Evidence Fusion Information Based on Distance Measure[J]. Journal of Computer Research and Development, 2006, 43(1): 169-175.
    [10]Xiao Hui and Hi Yunfa. Data Mining Based on Segmented Time Warping Distance in Time Series Database[J]. Journal of Computer Research and Development, 2005, 42(1): 72-78.

Catalog

    Article views (804) PDF downloads (749) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return