网络科学与网络空间研究院

Institute for Network Sciences and Cyberspace

姓名:贾珂婷

职称:副研究员

电话:010-62788631

邮箱:ktjia@tsinghua.edu.cn

教育背景

工学学士 (计算机科学与技术), 山东大学, 中国, 2005;

理学博士 (信息安全), 山东大学, 中国, 2010.

博士后,清华大学高等研究院, 2010.9-2013.1

研究领域

对称密码分析与设计

Hash函数

分组密码

消息认证码

认证加密算法

研究概况

主要从事对称密码分析与设计研究,承担或参加国家重点研发项目、973项目、自然基金项目等20多项。在IACR 5大国际密码会议发表论文7篇。主要研究成果如下:

参与国家重大卫星工程项目,在王小云院士的带领下,设计了两个分组密码算法,已经被用于我国航天重要行业领域,为保障航天安全通信做出了重要贡献。设计了分组密码算法FESH,采用比特切片方式的SL结构,通过自动化搜索构造了更安全高效的4 位S 盒以及基于4 分枝Feistel 结构的扩散层,提供强雪崩效用。算法具有足够的安全冗余,灵活性强, 软硬件实现性能与国际同类算法相比具有优势。

在密码分析方面,对AES、Camellia、CLEFIA、KASUMI等分组密码,以及认证加密算法Deoxys、NORX的安全性进行研究。将密钥关系与不可能差分路线、中间相遇攻击相结合,采用多种方法降低计算复杂度,给出国际标准AES,国际ISO标准Camellia和CLEFIA最优的分析结果。提出相关密钥矩形攻击新模型,对CAESAR竞赛获选算法Deoxys认证加密、SKINNY、GIFT等算法给出国际上最优分析结果。

学术成果

会议论文:

[1]Boxin Zhao, Xiaoyang Dong, Keting Jia and Willi Meier. Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128, Indocrypt 2019.

[2]Chao Liu, Zhongxiang Zheng, Keting Jia and Limin Tao. Identity-Concealed Authenticated Encryption from Ring Learning With Errors, Provsec 2019,2019,LNCS 11821,pp. 3-18.

[3]Chao Liu, Zhongxiang Zheng, Keting Jia and Qidi You. Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE,ISPEC 2019.

[4]Keting Jia, Ning Wang:Impossible Differential Cryptanalysis of 14-Round Camellia-192. ACISP (2) 2016: 363-378

[5]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki: Cryptanalysis of Reduced NORX. FSE 2016: 554-574

[6]Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong, Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia, FSE 2015.

[7]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang, Improved Attacks on Reduced-Round Camellia-128/192/256, CT-RSA 2015, LNCS 9048,2015, pp. 59-83;

[8]Leibo Li, Keting Jia, Xiaoyun Wang: Improved Single-Key Attacks on 9-Round AES-192/256, 2014, LNCS FSE 2014, LNCS 8540, 2015, pp. 1-20;

[9]Xuexin Zheng, Keting Jia: Impossible Differential Attack on Reduced-Round TWINE, ICISC 2013, LNCS 8565, pp.123-143

[10]Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang: Improved Cryptanalysis of the Block Cipher KASUMI. SAC 2012, LNCS 7707, pp. 222-233, 2012.

[11]Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang: Practical Attack on the Full MMB Block Cipher. SAC 2011, LNCS 7118, pp. 185-199, 2011.

[12]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang: Pseudo-Cryptanalysis of Luffa. INSCRYPT 2010, LNCS 6584, pp. 187-198, 2011.

[13]Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu: Distinguishing and Second-Preimage Attacks on CBC-Like MACs. CANS 2009, LNCS 5888, pp. 349-361, 2009.

[14]Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang: New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. ACISP 2011, LNCS 6812, pp. 16-33, 2011.(Best Paper)

[15]Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang: New Birthday Attacks on Some MACs Based on Block Ciphers. CRYPTO 2009, LNCS 5677, pp. 209-230, 2009.

[16]Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang: New Distinguishing Attack on MAC using Secret-Prefix Method. FSE 2009, LNCS 5665, pp. 363-374, 2009.

期刊论文:

[1]Qin Lingyue, Dong Xiaoyang, Jia Keting, Zong Rui. Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes,SCIENCE CHINA Information Sciences 64, Article number: 139103 (2021)

[2]Cui Tingting, Chen Shiyao, Fu Kai, Wang Meiqin, Jia Keting. New automatic tool for finding impossible differentials and zero-correlation linear approximations,SCIENCE CHINA Information Sciences 64, Article number: 129103 (2021)

[3]Quan Yuan, Puwen Wei, Keting Jia, Haiyang Xue: Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers. Sci. China Inf. Sci. 63(3) (2020)

[4]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Des. Codes Cryptogr. 88(6): 1103-1126 (2020)

[5]Boxin Zhao, Xiaoyang Dong, Keting Jia. New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect, IACR Transactions on Symmetric Cryptology ISSN 2519-173X, Vol. 2019, No. 3, pp. 121–151.

[6]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier. New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019)

[7]贾珂婷, 董晓阳, 魏淙洺,等. 分组密码算法FESH[J]. 密码学报, 2019(6):713-726.

[8]Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao. Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. SCIENCE CHINA Information Sciences 61(9): 098103:1-098103:3 (2018)

[9]丁瑶玲; 李璐; 贾珂婷. 基于不可能差分的SHA3-512约减轮区分攻击,密码学报, 2017(6):545-557.