###
DOI:
Journal of Software:2008.19(10):2659-2666

对DES的Rectangle攻击和Boomerang攻击
张蕾,吴文玲
(中国科学院 软件研究所 信息安全国家重点实验室,北京 100190; 中国科学院 研究生院 信息安全国家重点实验室,北京 100049)
Rectangle and Boomerang Attacks on DES
ZHANG Lei,WU Wen-Ling
()
Abstract
Chart / table
Reference
Similar Articles
Article :Browse 3264   Download 3378
Received:March 23, 2007    Revised:June 07, 2007
> 中文摘要: 作为加密标准,DES(data encryption standard)算法虽然已被AES(advanced encryption standard)算法所取代,但其仍有着不可忽视的重要作用.在一些领域,尤其是金融领域,DES和Triple DES仍被广泛使用着.而近年来又提出了一些新的密码分析方法,其中,Rectangle攻击和Boomerang攻击已被证明是非常强大而有效的.因此,有必要重新评估DES算法抵抗这些新分析方法的能力.研究了DES算法针对Rectangle攻击和Boomerang攻击的安全性.利用DES各轮最优差分路径及其概率,分别得到了对12轮DES的Rectangle攻击和对11轮DES的Boomerang攻击.攻击结果分别为:利用Rectangle攻击可以攻击到12轮DES,数据复杂度为262个选择明文,时间复杂度为242次12轮加密;利用Boomerang攻击可以攻击到11轮DES,数据复杂度为258个适应性选择明密文,时间复杂度为238次11轮加密.由于使用的都是DES各轮的最优差分路径,所以可以相信,该结果是Rectangle攻击和Boomerang攻击对DES所能达到的最好结果.
Abstract:In spite of being replaced by AES (advanced encryption standard), DES (data encryption standard) still plays an important role as encryption standard. DES and the triple DES are still widely used in many areas, especially in the financial sector. Recently, some new cryptanalytic techniques are introduced and of which the Rectangle attack and the Boomerang attack had proved to be very powerful. Therefore, it is necessary to re-evaluate the effects that these new cryptanalytic techniques may have on DES. This paper examines the strength of DES against the Rectangle attack and the Boomerang attack. By using the best differential characteristic of DES, the paper gets an attack against up to 12-round DES using the Rectangle attack and an attack against 11-round DES using the Boomerang attack respectively. The Rectangle attack on 12-round DES requires 262 chosen plaintexts and the time complexity is equivalent to 242 12-round encryptions, while the Boomerang attack on 11-round DES requires 258 adaptive chosen plaintexts and ciphertexts and the time complexity is equivalent to 238 11-round encryptions. Because the differential characteristics used in the attacks are all the best ones, it is believed that the attacks are the best results that the Rectangle attack and the Boomerang attack can get on DES.
文章编号:     中图分类号:    文献标志码:
基金项目:Supported by the National Natural Science Foundation of China under Grant No.90604036 (国家自然科学基金); the National Basic Research Program of China under Grant No.2004CB318004 (国家重点基础研究发展计划(973)); the National High-Tech Research and Development Plan of China under Grant No.2007AA01Z470 (国家高技术研究发展计划(863)) Supported by the National Natural Science Foundation of China under Grant No.90604036 (国家自然科学基金); the National Basic Research Program of China under Grant No.2004CB318004 (国家重点基础研究发展计划(973)); the National High-Tech Research and Development Plan of China under Grant No.2007AA01Z470 (国家高技术研究发展计划(863))
Foundation items:
Reference text:

张 蕾,吴文玲.对DES的Rectangle攻击和Boomerang攻击.软件学报,2008,19(10):2659-2666

ZHANG Lei,WU Wen-Ling.Rectangle and Boomerang Attacks on DES.Journal of Software,2008,19(10):2659-2666