期刊文献+

基于流密码代数攻击的研究

A Study of the Algebraic Attacks on Stream Ciphers
下载PDF
导出
摘要 概述了流密码代数攻击的提出和发展,介绍了它的基本思想。简要描述了代数攻击的一般算法和可攻击的流密码类型,针对带记忆和不带记忆非线性组合流密码的代数攻击,阐述了Courtois等人的具体工作,并给出了两个新的选择非线性布尔函数的标准。笔者提出了密码非线性部分未知情况下的一般代数攻击方法,最后总结了代数攻击的贡献和不足之处。 In this paper,the basic contents of the algebraic attacks on stream ciphers with linear feedback are introduced. A simple description is given to the general arithmetic of algebraic attacks and the type of stream ciphers that can be attacked,The rule discovered by Courtois at algebraic attacks on stream ciphers with (and without) memory is presented,and two new criterion on selecting good Boolean function are presented. A general algebraic attacks on ciphers which the nonlinear combiner unknown is put forward by writer,The contribution and shortage of algebraic attacks are summarized.
出处 《计算机科学》 CSCD 北大核心 2004年第11期11-13,共3页 Computer Science
基金 国家自然科学(60073051) 973项目(No:G1999035804)
关键词 代数攻击 流密码 布尔函数 非线性 算法 描述 组合 Stream ciphers,Correlation attack,Algebraic attacks,Multivariate equations,XL algorithm,Boolean function
  • 相关文献

参考文献13

  • 1Armknecht F, Krause M. Algebraic attacks on combiners with memory. Advances in Cryptology-Crypto 2003, LNCS 2729,Springer-Verlag,2003.162-175
  • 2Courtois N. The security of Hidden Field Equation (HFE). CTRSA 2001 ,LNCS 2020,Springer-Verlag,2001. 266-281
  • 3Courtois N. Higher order correlation attacks. XL algorithm and Cryptanalysis of Toyocrypt. ICISC 2002, LNCS 2587, SpringerVerlag,2002. 182-199
  • 4Courtois N. Algebraic attacks on combiners with memory and several outputs. E-print achieve,2003/125
  • 5Courtois N. Fast algebraic attack on stream ciphers with linear feedback. Advances in Cryptology-Crypto 2003, LNCS 2729,Springer-Verlag, 2003.176-194
  • 6Courtois N,Meier W. Algebraic attack on stream ciphers with linear feedback. Advances in Cryptology-Crypto 2003, LNCS2656,Springer-Verlag, 2003. 345-359
  • 7Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations. Asiacrypt 2002, LNCS 2501,Springer-Verlag, 2002. 267-287
  • 8Golic J D. On the Security of Nonlinear Filter Generators.FSE'96,LNCS 1039 ,Springer, 173-188
  • 9Lee D H,Kim J,Hong J W,Han J W,Moon D. Algebraic Attack on Summation Generators, E-print achieve, 2003/229
  • 10Meier W,Staffebach O. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1989, 1(3):159-176

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部