期刊文献+

改进的求和生成器的密码分析 被引量:2

Cryptanlysis of the Improved Summation Generator
下载PDF
导出
摘要 利用分别征服攻击、Chepyzhov提出的快速相关攻击以及代数攻击等3种算法对改进的求和生成器进行了密码分析。 In this paper, the divide and conquer attack, Chepyzhov's fast correlation attack and Algebraic attack are applied on the improved summation generator. The compute complexity of the attacks and the corresponding length of the keystream needed are also given.
出处 《中国科学院研究生院学报》 CAS CSCD 2005年第4期494-498,共5页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家攀登计划 973项目 (G19990 3 5 80 2 ) 国家自然科学基金项目 ( 60 2 73 0 2 7) 国家杰出青年科学基金项目 ( 60 0 2 5 2 0 5 )资助
关键词 改进的求和生成器 分别征服攻击 快速相关攻击 代数攻击 improved summation generator, divide and conquer attack, fast correlation attack, algebraic attack
  • 相关文献

参考文献13

  • 1Siegenthaler T. Correlation immunity of nonlinear combining functions for cryptographic applications. IEEE Transaction on Information Theory,1984, 30(9): 776 ~ 780
  • 2Rueppel RA. Correlation immunity and the summation generator. In: Advances in Cryptology-Crypto'86. Springer-Verlag, 1987. 260 ~ 272
  • 3Meier W, Staffelbach O. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1989, 1 (3): 159~ 176
  • 4Meier W, Staffelbach O. Correlation properties of combiner with memory in stream cipher. Journal of Cryptology, 1992, 5 ( 1 ): 67 ~ 86
  • 5Dawson E, Clark A. Divide and conquer attacks on certain classes of stream ciphers. Cryptologia, 1994,18( 1 ) :25 ~ 40
  • 6Lee HJ, Moon SJ. On an improved summation generator with 2-bit memory. Signal Processing, 2000, 80:211 ~ 217
  • 7Chan CK, Cheng LM. Correlation properties of an improved summation generator with 2-bit memory. Signal Processing, 2002, 82:907 ~ 909
  • 8Mex-Perera JC, Shepherd SJ. Cryptanalysis of an summation generator with 2-bit memory. Signal Processing, 2002, 82: 2025 ~ 2028
  • 9Chepyzhov V, Johansson T, Smeets B. A simple algorithm for fast correlation attacks on stream ciphers. In: Fast Software Encryption, FSE, 2000.Springer-Verlag, 2001. 181 ~ 195
  • 10Courtois NT. Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt. In: ICISC'2002. Springer-Verlag, 2003. 182 ~ 199

同被引文献12

  • 1ZHANGBin FENGDengguo.Analysis of the Generalized Self-Shrinking Generator with the Filter Function Known[J].Chinese Journal of Electronics,2005,14(3):472-476. 被引量:1
  • 2胡学先,那键,刘文芬.对Py的一种改进的区分攻击[J].计算机工程与应用,2007,43(16):152-155. 被引量:1
  • 3Siegenthaler T.Correlation immunity of nonlinear combining functions for cryptographic applications[J].IEEE Transactions on Information Theory, 1984,30(9):776-780.
  • 4Rueppel R A.Correlation immunity and the summation generator[C]// Williams H.Lecture Notes in Computer Science 218:Advances in Cryptology-Crypto' 85.Berlin : Springer-Verlag, 1986: 260-272.
  • 5Biham E,Seberry J.Py(Roo):a fast and secure stream cipher using rolling arrays.eSTREAM,ECRYPT Stream Cipher Project,Report 2005/023,2005.http://citeseer.ist.psu.edu/article/biham05py.
  • 6Chen K,Henricksen M,Millan W.Dragon:a fast word based stream cipher[C]//L6pez J.Lecture Notes in Computer Science 3506:Information Security and Cryptology-ICISC 2004.Berlin: Springer-Verlag, 2005 : 33-50.
  • 7Golic J.Correlation properties of a general binary combiner with memory[J]Journal of Cryptology, 1996,9(2) : 111-126.
  • 8Courtois T.Algebraic attacks on combiners with memory and several outputs[C]//Lopez J.Lecture Notes in Computer Science 3506: Information Security and Cryptology-ICISC 2004.Berlin:Springer- Verlag, 2005 : 3-20.
  • 9Duda O,Hart E.Pattern classification[M],李宏东,姚天翔,译.2版.北京:机械工业出版社,2003:105-114.
  • 10Crowley P.Improved cryptanalysis of Py. Worshop Record of SASC 2006-Stream ciphers revisited.Belgium:Leuven,2006:52-60.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部