Xiaoshuang Ma
Chinese Academy of Sciences
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Xiaoshuang Ma.
international conference on the theory and application of cryptology and information security | 2014
Siwei Sun; Lei Hu; Peng Wang; Kexin Qiao; Xiaoshuang Ma; Ling Song
We propose two systematic methods to describe the differential property of an S-box with linear inequalities based on logical condition modelling and computational geometry respectively. In one method, inequalities are generated according to some conditional differential properties of the S-box; in the other method, inequalities are extracted from the H-representation of the convex hull of all possible differential patterns of the S-box. For the second method, we develop a greedy algorithm for selecting a given number of inequalities from the convex hull. Using these inequalities combined with Mixed-integer Linear Programming (MILP) technique, we propose an automatic method for evaluating the security of bit-oriented block ciphers against the (related-key) differential attack with several techniques for obtaining tighter security bounds, and a new tool for finding (related-key) differential characteristics automatically for bit-oriented block ciphers.
international conference on information security | 2015
Qianqian Yang; Lei Hu; Siwei Sun; Kexin Qiao; Ling Song; Jinyong Shan; Xiaoshuang Ma
In CRYPTO 2014 Albrecht et al. brought in a 20-round iterative lightweight block cipher PRIDE which is based on a good linear layer for achieving a tradeoff between security and efficiency. A recent analysis is presented by Zhao et al. Inspired by their work, we use an automatic search method to find out 56 iterative differential characteristics of PRIDE, containing 24 1-round iterative characteristics, based on three of them we construct a 15-round differential and perform a differential attack on the 19-round PRIDE, with data, time and memory complexity of 262, 263 and 271 respectively.
Science in China Series F: Information Sciences | 2017
Danping Shi; Lei Hu; Siwei Sun; Ling Song; Kexin Qiao; Xiaoshuang Ma
摘要创新点密码算法的不同部件具有相同输入时的线性逼近的相关度计算不能应用堆积引理, 其计算是一个对线性分析结果有重要影响的难题。 充分考虑了 SIMON 分组密码算法不同运算的相关性, 通过化标准二次型的方法准确计算了轮函数线性逼近的相关度, 得到精确的线性分析结果。 基于混合整数线性规划建模, 找到了 SIMON 算法的多个版本的更好的线性迹和线性闭包, 给出了 SIMON 的更好的密钥恢复攻击结果。
international conference on information security | 2015
Siwei Sun; Lei Hu; Meiqin Wang; Qianqian Yang; Kexin Qiao; Xiaoshuang Ma; Ling Song; Jinyong Shan
We focus on extending the applicability of the mixed-integer programming MIP based method in differential cryptanalysis such that more work can be done automatically. Firstly, we show how to use the MIP-based technique to obtain almost all high probability 2-round iterative related-key differential characteristics of PRIDE a block cipher proposed in CRYPTO 2014 automatically by treating the
network and system security | 2014
Xiaoshuang Ma; Lei Hu; Siwei Sun; Kexin Qiao; Jinyong Shan
network and system security | 2015
Xiaoshuang Ma; Kexin Qiao
g_i^{j}\cdot
international workshop on security | 2015
Siwei Sun; Lei Hu; Kexin Qiao; Xiaoshuang Ma; Jinyong Shan; Ling Song
advanced industrial conference on telecommunications | 2015
Kexin Qiao; Lei Hu; Siwei Sun; Xiaoshuang Ma
giji¾ź function with a special kind of modulo addition operations in the key schedule algorithm of PRIDE as an
IACR Cryptology ePrint Archive | 2014
Danping Shi; Lei Hu; Siwei Sun; Ling Song; Kexin Qiao; Xiaoshuang Ma
IACR Cryptology ePrint Archive | 2014
Siwei Sun; Lei Hu; Meiqin Wang; Peng Wang; Kexin Qiao; Xiaoshuang Ma; Danping Shi; Ling Song
8 \times 8