计算机工程与应用 ›› 2011, Vol. 47 ›› Issue (23): 117-120.

• 网络、通信、安全 • 上一篇    下一篇

改进Twister碰撞攻击技术

曾绍昆1,2,毛 明1,2,3,贺 强1,2,杨兴华1,2   

  1. 1.北京电子科技学院 信息安全系,北京 100070
    2.西安电子科技大学 通信工程学院,西安 710071
    3.电子科技大学 计算机科学与工程学院,成都 610054
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2011-08-11 发布日期:2011-08-11

Improved technology of collision attack for Twister algorithm

ZENG Shaokun1,2,MAO Ming1,2,3,HE Qiang1,2,YANG Xinghua1,2   

  1. 1.Department of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
    2.School of Telecommunication Engineering,Xidian University,Xi’an 710071,China
    3.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2011-08-11 Published:2011-08-11

摘要: Twister是SHA-3候选算法中的一个典型的基于AES结构的分组密码算法。介绍Twister算法现有攻击技术,并对计算复杂度进行分析。运用反弹攻击,设计了一种可行的差分路径,对Twister算法圈的碰撞攻击进行分析,得到计算复杂度分别为2128和2184的圈碰撞。基于此对Twister压缩函数的碰撞攻击进行分析,可以降低其计算复杂度。

关键词: Twister算法, 碰撞攻击, 反弹攻击, 计算复杂度, SHA-3

Abstract: The Twister algorithm is one candidate algorithm of SHA-3,a typical block cipher algorithm based on AES stucture.This paper describes the current attack technology on Twister,and analyses computational complexity as well.Using the rebound attack,a feasible differential path is designed to analyse the collision attack on the maxi-round of Twister and obtain the collisions whose complexity are 2128 and 2184 respectively.Based on the analysis of the collision attack on the compression function of Twister,the computational complexity can be reduced.

Key words: Twister algorithm, collision attack, rebound attack, computational complexity, SHA-3