期刊文献+

Algebraic Attack on Filter-Combiner Model Keystream Generators

Algebraic Attack on Filter-Combiner Model Keystream Generators
下载PDF
导出
摘要 Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new criterion for designing Filter-Combiner model was alsoproposed: the total length I. of Linear Finite State Machines used in the model should be largeenough and the degree d of Filter-Combiner function should be approximate [L/2]. Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new criterion for designing Filter-Combiner model was alsoproposed: the total length I. of Linear Finite State Machines used in the model should be largeenough and the degree d of Filter-Combiner function should be approximate [L/2].
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期259-262,共4页 武汉大学学报(自然科学英文版)
基金 SupportedbytheNationalGrandFundamentalResearch973ProgramofChinaunderGrant(TG1999035803)
关键词 algebraic attack Filter-Combiner model stream cipher 'XL' algorithm function composition algebraic attack Filter-Combiner model stream cipher 'XL' algorithm function composition
  • 相关文献

参考文献2

  • 1Dingfeng Ye,Zongduo Dai,Kwok-Yan Lam.Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions[J].Journal of Cryptology.2001(2)
  • 2Ye Ding-feng,Dai Zong-duo,Kwok-Yan.Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions[].Journal of Cryptology.2001

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部