计算机工程与应用 ›› 2011, Vol. 47 ›› Issue (35): 110-112.

• 网络、通信、安全 • 上一篇    下一篇

16轮Blow-CAST-Fish的弱密钥攻击

孙晓玲1,王美琴2,孙旭光1,李 忠1,李姗姗1,杨秋格1,梁 峰3   

  1. 1.防灾科技学院 灾害信息工程系,北京 101601
    2.山东大学 密码技术与信息安全教育部重点实验室,济南 250100
    3.解放军69036部队
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2011-12-11 发布日期:2011-12-11

Weak-key attack on 16-round Blow-CAST-Fish

SUN Xiaoling1,WANG Meiqin2,SUN Xuguang1,LI Zhong1,LI Shanshan1,YANG Qiuge1,LIANG Feng3   

  1. 1.Department of Disaster Information Engineering,Institute of Disaster Prevention,Beijing 101601,China
    2.Key Laboratory of Cryptologic Technology and Information Security,Ministry of Education,Shandong University,Jinan 250100,China
    3.People’s Liberation Army 69036
  • Received:1900-01-01 Revised:1900-01-01 Online:2011-12-11 Published:2011-12-11

摘要: Blow-CAST-Fish的轮函数F由作为算法子密钥的四个S盒构成。如果S盒产生碰撞,则可构造F函数的输入差分为非零、输出差分为零的差分特征,进而对算法进行差分分析以获取其他子密钥。研究单个S盒的碰撞,构造F函数的差分特征,并测试使特征成立的弱密钥比例,给出了特征概率为2-49,弱密钥比例为2-52.4的14轮差分特征,并以此为基础,攻击16轮Blow-CAST-Fish。

关键词: Blow-CAST-Fish, 差分特征, 弱密钥, 轮函数, S盒

Abstract: The round function F of Blow-CAST-Fish is composed of four S-boxes which are part of the subkeys.If S-boxes have a collision,the differential characteristic of function F with non-zero inputxor and a zero outputxor can be developed to perform a differential cryptanalysis of the algorithm which can recover the rest of the subkeys.After analyzing the collision of one S-box,differential characteristic of function F is constructed,then the 14-round differential characteristic with the probability 2-49 is identified.And the proportion of weak keys which can produce the differential characteristic is tested to be 2-52.4.Then based on 14-round differential characteristic,16-round Blow-CAST-Fish can be attacked.

Key words: Blow-CAST-Fish, differential characteristic, weak keys, round function, S-box