• 中国期刊全文数据库
  • 中国学术期刊综合评价数据库
  • 中国科技论文与引文数据库
  • 中国核心期刊(遴选)数据库
朱程辉, 叶涛, 韦永壮. 认证加密算法TinyJAMBU的单密钥比特泄露检测方法[J]. 桂林电子科技大学学报, xxxx, x(x): 1-7. doi: 10.3969/1673-808X.202328
引用本文: 朱程辉, 叶涛, 韦永壮. 认证加密算法TinyJAMBU的单密钥比特泄露检测方法[J]. 桂林电子科技大学学报, xxxx, x(x): 1-7. doi: 10.3969/1673-808X.202328
ZHU Chenghui, YE Tao, WEI Yongzhuang. A single key bit leakage detection method of authenticated encryption algorithm TinyJAMBU[J]. Journal of Guilin University of Electronic Technology, xxxx, x(x): 1-7. doi: 10.3969/1673-808X.202328
Citation: ZHU Chenghui, YE Tao, WEI Yongzhuang. A single key bit leakage detection method of authenticated encryption algorithm TinyJAMBU[J]. Journal of Guilin University of Electronic Technology, xxxx, x(x): 1-7. doi: 10.3969/1673-808X.202328

认证加密算法TinyJAMBU的单密钥比特泄露检测方法

A single key bit leakage detection method of authenticated encryption algorithm TinyJAMBU

  • 摘要: 针对认证加密算法TinyJAMBU的密钥泄露检测问题,基于可分性质的混合整数线性规划(MILP)构建了立方分析模型,并提出一种缩减轮TinyJAMBU的单密钥比特泄露检测方法。该方法运用不等式方程组刻画了密码算法中基本操作的可分性质模型,并由MILP工具求解及检测密钥泄露情况。实验测试结果表明:在立方变元取自随机数(nonce)的第0位至第63位间,仍能快速检测出缩减TinyJAMBU 345加密轮内的单密钥泄露情况;所需的时间复杂度为29次加密运算次数;数据复杂度为29选择数据量。与已有攻击方法相比较,该方法在适用性及实现复杂度方面均有明显优势。

     

    Abstract: In order to solve the problem of key leakage detection of the authenticated encryption algorithm TinyJAMBU, a cube attack model is constructed based on the mixed integer linear programming (MILP) with division property. Moreover, a single key bit leakage detection method based on the reduced round TinyJAMBU is proposed. This method uses inequality equations to describe the division property model of the basic operations in the cryptographic algorithm, and uses the MILP tool to solve and detect the key leakage. The experimental results illustrate that the single key leakage in the reduced TinyJAMBU 345 encryption rounds can still be quickly detected when the cube variables is taken from the 0th to 63rd bits of the random number(nonce), where the required time complexity is less than 29 encryption operations and the data complexity is less than 29 chosen plaintext. Compared with the previous methods, this method achieves obvious advantages in both the applicability and the implementation complexity.

     

/

返回文章
返回