Text
Integral Attack pada Reduced Round Algoritme SLIM
Abstrak:
Algoritme SLIM merupakan salah satu algoritme kunci simetris block cipher
dengan struktur feistel. Penelitian ini meguji ketahanan Algoritme SLIM terhadap
integral attack dengan mengaktifkan satu hingga empat nibble pada posisi ??1
hingga ??4 dalam semua kemungkinan posisi.
Penelitian dimulai dengan mengenkripsi himpunan 16 plaintext atau ? ??????? untuk
menemukan integral distinguisher. Hasil pencarian integral distinguisher,
ditemukan integral distinguisher 3 round sebanyak 3 distinguisher, 4 round
sebanyak 8 distinguisher, dan 5 round sebanyak 4 distinguisher. Integral
distinguisher ini memiliki 16 unbalanced nibble yang dapat digunakan untuk
melakukan recovery kunci.
Proses recovery kunci melibatkan pencarian irisan kandidat-kandidat kunci dari tiga
? ??????? setiap integral distinguisher. Penelitian yang dilakukan hanya dapat
menemukan kunci round ketiga dan kunci round keempat. Kunci round ketiga
didapatkan dari dekripsi ? ??????? yang memiliki integral distinguisher tiga round,
dan kunci round keempat dengan integral distinguisher empat round. Penerapan
integral attack pada algoritme SLIM dengan mengaktifkan satu hingga empat
nibble dengan seluruh variasi posisi tidak efektif pada full round algoritme SLIM
karena setelah lima round, seluruh nibble pada algoritme SLIM sudah unbalanced
dengan kata lain, full round algoritme SLIM aman terhadap integral attack.
Abstract:
The SLIM Algorithm is one of the symmetric key block ciphers algorithm with a
feistel structure. This research examines the resilience of the SLIM Algorithm
against integral attacks by activating one to four nibbles at positions ??1 to ??4 in all
possible positions.
The research starts by encrypting a set of 16 plaintexts or ? ????????? to discover
integral distinguishers. As a results of the search for integral distinguishers, three
distinguisher of 3 rounds, eight distinguishers of 4 rounds, and four distinguishers
of 5 rounds are found. These integral distinguishers have 16 unbalanced nibbles
that can be used for key recovery.
The key recovery process involves searching for candidate key intersections from
three ? ????????? for each integral distinguisher. The conducted research can only
identify the third-round key and the fourth-round key. The third-round key is
obtained from the decryption of the ? ??????? with a three-round integral
distinguisher, and the fourth-round key with a four-round integral distinguisher.
Applying an integral attacks on the SLIM algorithm by activating one to four
nibbles with all position variations is not effectively on full round SLIM algorithm
because after five rounds, all nibbles in the SLIM algorithm become unbalanced,
in other word, the full round of the SLIM algorithm resistant to integral attacks.
No copy data
No other version available