DOI QR코드

DOI QR Code

무선 센서 네트워크 환경에 적합한 블록 암호 MD-64에 대한 안전성 분석

Security Analysis of Block Cipher MD-64 Suitable for Wireless Sensor Network Environments

  • 이창훈 (한신대학교 컴퓨터공학부)
  • 투고 : 2011.09.28
  • 심사 : 2011.10.30
  • 발행 : 2011.10.31

초록

64-비트 블록 암호 MD-64는 WSN과 같은 환경에서 효율적으로 구현이 가능하도록 설계된 블록 암호이다. 본 논문에서는 MD-64의 전체 라운드에 대한 확장된 연관키 부메랑 공격을 제안한다. 본 논문에서 소개하는 공격은 MD-64에 대한 첫 번째 공격이며, $2^{45.5}$개의 연관키 선택 평문을 이용하여 $2^{95}$의 MD-64 암호화 연산을 수행하여 MD-64의 비밀키를 복구한다.

MD-64 is a 64-bit block cipher suitable for the efficient implementation in hardware environments such as WSN. In this paper, we propose a related-key amplified boomerang attack on the full-round MD-64. The attack on the full-round MD-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{95}$ MD-64 encryptions. This work is the first known cryptanalytic result on MD-64.

키워드

과제정보

연구 과제 주관 기관 : 한신대학교

참고문헌

  1. N. Goots, A. Moldovyan, N. Moldovyan, "Fast Encryption Algorithm Spectr-H64", MMM- ACNS'01, LNCS 2052, pp. 275-286, Springer- Verlag, 2001.
  2. A. Moldovyan and N. Moldovyan, "A cipher Based on Data-Dependent Permutations", Journal of Cryptology, Vol.15, No.1, pp. 61-72, 2002. https://doi.org/10.1007/s00145-001-0012-9
  3. N. Goots, B. Izotov, A. Moldovyan and N. Moldovyan, "Modern cryptography: Protect Your Data with Fast Block Ciphers", Wayne, A-LIST Publish., 2003.
  4. N. Goots, N. Moldovyan, P. Moldovyanu and D. Summerville, "Fast DDP-Based Ciphers: From Hardware to Software", 46th IEEE Midwest International Symposium on Circuits and Systems, 2003.
  5. N. Sklavos, N. Moldovyan and O. Koufopavlou, "High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers", Mobile Networks and Applications-MONET, Kluwer Academic Publishers, Vol.25, Issue 1-2, pp. 219-231, 2005.
  6. N, Moldovyan, A. Moldovyan, M. Eremeev and D. Summerville, "Wireless Networks Security and Cipher Design Based on Data-Dependent Operations: Classification of the FPGA Suitable Controlled Elements", CCCT'04, Vol.VII, pp. 123-128, Texas, USA, 2004.
  7. N. Moldovyan, A. Moldovyan, M. Eremeev and N. Sklavos, "New Class of Cryptographic Primitives and Cipher Design for Networks Security", International Journal of Network Security, Vol.2, No.2, pp. 114-225, 2006.
  8. N. Moldovyan, "On Cipher Design Based on Switchable Controlled Operations", MMM- ACNS'03, LNCS 2776, pp. 316-327, Springer- Verlag, 2003.
  9. Y. Ko, D. Hong, S. Hong, S. Lee and J. Lim, "Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property", MMM-ACNS'03, LNCS 2776, pp. 298-307, Springer- Verlag, 2003.
  10. Y. Ko, C. Lee, S. Hong and S. Lee, "Related Key Differential Cryptanalysis of Full-Round SPECTR- H64 and CIKS-1", ACISP'04, LNCS 3108, pp. 137-148, Springer-Verlag, 2004.
  11. Y. Ko, C. Lee, S. Hong, J. Sung and S. Lee, "Related-Key Attacks on DDP based Ciphers: CIKS-128 and CIKS-128H", Indocrypt'04, LNCS 3348, pp. 191-205, Springer-Verlag, 2004.
  12. C. Lee, D. Hong, S. Lee, S. Lee, H. Yang and J. Lim, "A Chosen Plaintext Linear Attack on Block Cipher CIKS-1", ICICS'02, LNCS 2513, pp. 456-468, Springer-Verlag, 2002.
  13. C. Lee, J. Kim, S. Hong, J. Sung and S. Lee, "Related-Key Differential Attacks on Cobra- S128, Cobra-F64a, and Cobra-F64b", MYCRYPT'05, LNCS 3715, pp. 245-263, Springer-Verlag, 2005.
  14. C. Lee, J. Kim, J. Sung, S. Hong and S. Lee, "Related-Key Differential Attacks on Cobra- H64 and Cobra-H128", CCC'05, LNCS 3796, pp. 201- 219, Springer-Verlag, 2005.
  15. J. Lu, C. Lee and J. Kim, "Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b", SCN'06, LNCS 4116, pp. 95-110, Springer-Verlag, 2006.
  16. K. Jeong, C. Lee, J. Sung, S. Hong and J. Lim, "Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128", ACISP'07, LNCS 4586, pp. 143-157, Springer-Verlag, 2007.
  17. K. Jeong, C. Lee, J. Kim and S. Hong, "Security analysis of the SCO-family using key schedules", Information Sciences, Vol. 179, pp. 4232-4242, Elsevier, 2009. https://doi.org/10.1016/j.ins.2009.08.009
  18. N. Minh, D. Bac and H. Duy, "New SDDO-Based Block Cipher for Wireless Sensor Network Security", IJCSNS, Vol. 10, No. 3, pp. 54-60, 2010.