[1]王淦,张文英. S HA-3轮函数中ρ、π及χ变换的逆变换[J].计算机技术与发展,2014,24(12):151-154.
 WANG Gan,ZHANG Wen-ying. Inverse Mappings ofρ、πand χMappings in SHA-3 Permutation[J].,2014,24(12):151-154.
点击复制

 S HA-3轮函数中ρ、π及χ变换的逆变换()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年12期
页码:
151-154
栏目:
安全与防范
出版日期:
2014-12-10

文章信息/Info

Title:
 Inverse Mappings ofρ、πand χMappings in SHA-3 Permutation
文章编号:
1673-629X(2014)12-0151-04
作者:
 王淦张文英
 1.山东师范大学 信息科学与工程学院;2. 山东省分布式计算机软件新技术重点实验室
Author(s):
 WANG GanZHANG Wen-ying
关键词:
 Hash函数SHA-3轮函数逆变换
Keywords:
 Hash function SHA-3permutationinverse mappings
分类号:
TP309.7
文献标志码:
A
摘要:
 Keccak自2012年被宣布为新一代Hash函数标准SHA-3后受到密码学界的高度关注,成为当前Hash函数研究的热点。文中给出了SHA-3轮函数中ρ、π和χ三个变换的逆变换。ρ变换只在同一道内沿z轴正向循环移位,故依据其移位距离表沿z轴负方向移位同样距离即得到其逆变换ρ-1;π变换依赖于GF (5)上一个2阶变换矩阵,利用高斯消元法对此方阵求逆可得到其逆矩阵,也即得到了π变换的逆变换;χ变换是SHA-3轮函数中唯一的非线性变换,首先列出χ变换的真值表,然后通过真值表推导得出了其逆变换χ-1的布尔函数表达式。基于ρ-1、π-1和χ-1,可利用中间相遇攻击的思想构造差分路径对SHA-3进行攻击,通过消息修改技术使差分路径以概率1通过χ-1,能够大大提高攻击成功的概率。
Abstract:
 Keccak has become a hotspot after it has been selected as the new Hash standard SHA-3 in 2012.In this paper,give the inverse mappings ofρ,πandχmappings in SHA-3 permutation.ρmapping intends to provide intra lane diffusion along z axis.By shifting to-ward the reverse direction in terms of the same rotation constants table ofρ,can get its inverse mappingρ-1 .The inverse mapping ofπis obtained by using Gauss elimination method on the transformational matrix ofπin GF(5 ).χmapping is the only non-linear mapping of SHA-3 permutation,give its inverse mapping in the form of Boolean function expression through the truth table ofχ.By means of the inverse mappings ofρ,πandχ,a differential attack on SHA-3 can be implemented using the meet-in-the-middle thought.In addition, by using the message modification technique,the differential path can be throughχ-1 with probability 1 ,thus greatly improving the success probability of the attack.

相似文献/References:

[1]黄子龙 张政保 文家福 李占德.一种基于Hash函数的脆弱水印算法[J].计算机技术与发展,2011,(02):151.
 HUANG Zi-long,ZHANG Zheng-bao,WEN Jia-fu,et al.Fragile Image Watermarking Algorithm Based on Hash Function[J].,2011,(12):151.
[2]吴杨 矫文成 赵新杰 王韬 吴克辉.引入Hash函数的抗差分故障分析模型研究[J].计算机技术与发展,2011,(05):166.
 WU Yang,JIAO Wen-cheng,ZHAO Xin-jie,et al.Research in Anti-DFA Model with Hash Function[J].,2011,(12):166.
[3]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(12):1.
[4]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(12):5.
[5]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(12):13.
[6]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(12):21.
[7]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(12):25.
[8]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(12):29.
[9]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(12):34.
[10]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(12):38.

更新日期/Last Update: 2015-04-15