›› 2012, Vol. ›› Issue (06): 1515-1520.

Previous Articles     Next Articles

Cryptanalysis and improvement on subkey extendable algorithm of IDEA

HU Liang1, YAN Zhi-jia2, CHU Jian-feng1, YUAN Wei1, XU Xiao-bo1   

  1. 1. College of Computer Seience and Technology, Jilin University, Changchun 130022, China;
    2. College of Software, Jilin University, Changchun 130022, China
  • Received:2011-09-30 Online:2012-11-01

Abstract: This paper improves the subkey extendable algorithm of International Data Encryption algorithm (IDEA). This algorithm employs the pseudo-random sequence to implement the randomness of the subkey. So the attacker can not analyze the position of the initial key in subkeys, and the attacker can not ensure the position of the weak key. In the process of subkey generation using pseudo-random sequence, the linear probing rescattering is imported to avoid the occurrence that different frequencies of initial key may cause new weak key. Testable attacking experiment and analysis of security and efficiency show that such improvement can enhance the safety and efficiency.

Key words: computer application, weak key, pseudo-random sequence, linear probing rescattering

CLC Number: 

  • TP309.7
[1] Lai Xue-jia, Massey J L. A proposal for a new block encryption standard[C]//Eurocrypt'90 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, New York, USA 1991: 389-404.
[2] Lai Xue-jia, Massey J L. Hash function based on block ciphers[C]//Lecture Notes in Computer Science, 1993, 658: 55-70.
[3] Hawkes P. Differential-linear weak key classes of IDEA[J]. Lecture Notes in Computer Science, 1998, 1403:112-126.
[4] 杨维忠,李彤. 变长密钥的IDEA算法的研究与实现[J]. 计算机工程,2004,30(9):139-141. Yang Wei-zhong, Li Tong. Study and implementation of IDEA of the variable length keys[J]. Computer Engineering,2004,30(9):139-141.
[5] 吴伟彬, 黄元石. IDEA算法的改进及其应用[J].福州大学学报:自然科学版,2004(增刊1):28-31. Wu Wei-bin, Huang Yuan-shi. The improvement of IDEA algorithm and its application[J]. Journal of Fuzhou University(Natural Science),2004(Sup.1):28-31.
[6] 张青凤,殷肖川,李长青. IDEA算法及其编程实现[J]. 现代电子技术,2006(1):69-71. Zhang Qing-feng,Yin Xiao-chuan,Li Chang-qing. Principle and implementation of the IDEA algorithm[J]. Modern Electronics Technique,2006(1):69-71.
[7] Lai X J,Massey J L,Murphy S. Markov ciphers anddifferential cryptanalysis[C]//Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, Heidelberg,1992:17-38.
[8] Schneier B. 应用密码学[M]. 吴世忠译.北京:机械工业出版社, 2000.
[9] Stallings W. 密码编码学与网络安全:原理与实践[M]. 第4版.孟庆树,王丽娜,傅建明,等译.北京:电子工业出版社,2001.
[10] Daemen J, Govaerts R,Vandewalle J. Weak keys for IDEA[C]//Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology,New York, USA,1993:224-231.
[11] Meier W. On the security of the IDEA block cipher[J]. Lecture Notes in Computer Science, 1994, 765:371-385.
[12] Hawkes P,O'Connor L. On applying linear cryptanalysis to IDEA[J]. Lecture Notes in Computer Science, 1996, 116:105-115.
[13] 鲁林真,陈少真. 对5轮IDEA算法的两种攻击[J]. 北京大学学报,2010,46(5):731-735. Lu Lin-zhen,Chen Shao-zhen. Two attacks on 5-round IDEA[J]. Acta Scientiarum Naturalium Universitatis Pekinensis,2010,46(5):731-735.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!