Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 1461520, 10 pages
https://doi.org/10.1155/2017/1461520
Research Article

New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4

1Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China
2Weifang University, Weifang, China

Correspondence should be addressed to Meiqin Wang; nc.ude.uds@gnawqm

Received 8 June 2017; Accepted 1 August 2017; Published 6 September 2017

Academic Editor: Jesús Díaz-Verdejo

Copyright © 2017 Yu Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W. Diffie and G. Ledin, “SMS4 Encryption Algorithm for Wireless Networks,” Cryptology ePrint Archive 2008/329, 2014, http://eprint.iacr.org/2008/329.pdf. View at Google Scholar
  2. “Office of State Commercial Cryptography Administration: Specification of SMS4, block cipher for WLAN products-SMS4” (Chinese), http://www.oscca.gov.cn/UpFile/200621016423197990.pdf.
  3. T. Kim, J. Kim, S. Hong, and J. Sung, “Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher,” IACR Cryptology ePrint Archive 2008/281, 2008, https://eprint.iacr.org/2008/2811.pdf. View at Google Scholar
  4. J. Etrog and M. J. B. Robshaw, “The Cryptanalysis of Reduced-Round SMS4,” in Selected Areas in Cryptography, vol. 5381 of Lecture Notes in Computer Science, pp. 51–65, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Zhang, W. Wu, D. Feng, and B. Su, “Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard,” in Information Security Practice and Experience, vol. 5451 of Lecture Notes in Computer Science, pp. 324–335, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. F. Liu, W. Ji, L. Hu et al., “Analysis of the SMS4 Block Cipher,” in Information Security and Privacy, vol. 4586 of Lecture Notes in Computer Science, pp. 158–170, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  7. B.-Z. Su, W.-L. Wu, and W.-T. Zhang, “Security of the SMS4 block cipher against differential cryptanalysis,” Journal of Computer Science and Technology, vol. 26, no. 1, pp. 130–138, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  8. J. Cho and K. Nyberg, “Improved Linear Cryptanalysis of SMS4 Block Cipher,” Symmetric Key Encryption Workshop, pp. 1–14, 2011. View at Google Scholar
  9. M.-J. Liu and J.-Z. Chen, “Improved linear attacks on the Chinese block cipher standard,” Journal of Computer Science and Technology, vol. 29, no. 6, pp. 1123–1133, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. K. Bai and C. Wu, “A secure white-box SM4 implementation,” Security and Communication Networks, vol. 9, no. 10, pp. 996–1006, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Zhang, W. Wu, and Y. Zheng, “Security of SM4 Against (Related-Key) Differential Cryptanalysis,” in Proceedings of the International Conference on Information Security Practice and Experience, vol. 10060 of Lecture Notes in Computer Science, pp. 65–78, Springer, Berlin, Germany, November 2016. View at Publisher · View at Google Scholar
  12. B. Zhang and C. Jin, “Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function,” Science China Information Sciences, vol. 55, no. 9, pp. 2161–2170, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  13. T. Helleseth, “Linear cryptanalysis method for des cipher,” in Advances in Cryptology—EUROCRYPT, vol. 765 of Lecture Notes in Computer Science, pp. 386–397, Springer, Berlin, Germany, 1993. View at Publisher · View at Google Scholar
  14. F. Sano, K. Ohkuma, H. Shimizu, and S. Kawamura, “On the security of nested SPN cipher against the differential and linear cryptanalysis,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E86-A, no. 1, pp. 37–46, 2003. View at Google Scholar · View at Scopus
  15. G. Jakimoski and L. Kocarev, “Differential and linear probabilities of a block-encryption cipher,” IEEE Transactions on Circuits and Systems. I. Fundamental Theory and Applications, vol. 50, no. 1, pp. 121–123, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. Y. Sun, “Linear Cryptanalysis of Light-Weight Block Cipher ICEBERG,” in Advances in Electronic Commerce, Web Application and Communication, vol. 149, pp. 529–532, Springer Berlin Heidelberg, Berlin, Germany, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. Y. Liu, K. Fu, W. Wang, L. Sun, and M. Wang, “Linear cryptanalysis of reduced-round SPECK,” Information Processing Letters, vol. 116, no. 3, pp. 259–266, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  18. D. Toz and O. Dunkelman, “Analysis of two attacks on reduced-round versions of the SMS4,” in Information and Communications Security, vol. 5308 of Lecture Notes in Computer Science, pp. 141–156, Springer Berlin Heidelberg, Berlin, Heidelberg, 2008. View at Publisher · View at Google Scholar
  19. Z. Liu, D. Gu, and J. Zhang, “Multiple linear cryptanalysis of reduced-round SMS4 block cipher,” Chinese Journal of Electronics, vol. 19, no. 3, pp. 389–393, 2010. View at Google Scholar · View at Scopus
  20. M. Matsui, “On correlation between the order of S-boxes and the strength of DES,” in Advances in cryptology—EUROCRYPT, vol. 950 of Lecture Notes in Comput. Sci., pp. 366–375, Springer, Berlin, Germany, 1994. View at Publisher · View at Google Scholar · View at MathSciNet
  21. A. Biryukov and V. Velichkov, “Automatic search for differential trails in ARX ciphers,” in Topics in Cryptology—CT-RSA 2014, vol. 8366 of Lecture Notes in Comput. Sci., pp. 227–250, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar · View at MathSciNet
  22. E. Biham, “On Matsui's linear cryptanalysis,” in Advances in Cryptology, vol. 950 of Lecture Notes in Comput. Sci., pp. 341–355, Springer, Berlin, Germany, 1994. View at Publisher · View at Google Scholar · View at MathSciNet
  23. J. Daemen, R. Govaerts, and J. Vandewalle, “Correlation matrices,” in Fast Software Encryption, vol. 1008 of Lecture Notes in Computer Science, pp. 275–285, Springer, Berlin, Germany, 1994. View at Publisher · View at Google Scholar
  24. N. Ferguson, J. Kelsey, S. Lucks et al., “Improved Cryptanalysis of Rijndael,” in Fast Software Encryption, vol. 1978 of Lecture Notes in Computer Science, pp. 213–230, Springer, Berlin, Germany, 2000. View at Publisher · View at Google Scholar
  25. A. Bogdanov and E. Tischhauser, “On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2,” in Fast Software Encryption, vol. 8424 of Lecture Notes in Computer Science, pp. 19–38, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar · View at Scopus