期刊文献+

流密码代数攻击的研究现状及其展望 被引量:6

Review of algebraic attacks on stream ciphers
下载PDF
导出
摘要 介绍了流密码代数攻击方法的基本原理及其实现方法,详细描述了对具有LFSR结构的密钥流生成器的代数分析手段,概括了现有的降低已得方程系统次数的有效方法,对整个代数攻击的计算复杂度的估计进行了全面的分析,最后对流密码代数攻击方法的研究前景进行了展望。 The basic theory and realizing methods of algebraic attacks on stream ciphers are presented. Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations system are described in detail. After analyzing the complexity of whole procedures in algebraic attacks, the direction and future works of this research filed are summarized in the end.
出处 《通信学报》 EI CSCD 北大核心 2006年第1期91-98,共8页 Journal on Communications
基金 国家自然科学基金资助项目(60373059 60373047) 教育部博士点基金资助项目(20040013007) 国家"973"计划基金资助项目(2004CB318004)~~
关键词 密码学 流密码 综述 代数攻击 XL算法 cryptography stream cipher review algebraic attacks XL algorithm
  • 相关文献

参考文献30

  • 1PATARIN J.Hidden fields equations (hfe) and isomorphisms of polynomials (IP):two new families of asymmetric algorithms[A].Advances in Cryptology-Eurocrypt'96[C].Berlin:Springer-Verlag,1996.33-48
  • 2KIPNIS A,PATARIN J,GOUBIN L.Unbalanced oil and vinegar signature schemes[A].Advances in Cryptology-Eurocrypt 1999[C].Berlin:Springer-Verlag,1999.206-222.
  • 3COURTOIS N T,PIEPRZYK J.Cryptanalysis of block ciphers with overdefined systems of equations[A].Advances in CryptologyAsiacrpt 2002[C].Berlin:Springer-Verlag,2002.267-287.
  • 4COURTOIS N T.Higher order correlation attacks,XL algorithm and cryptanalysis of Toyocrypt[A].Information Security and Cryptology 2002[C].Berlin:Springer-Verlag,2003.182-199.
  • 5ARMKNECHT F.A linearization attack on the bluetooth key stream generator[EB/OL].http://eprint.iacr.org/ 2002 /191,2002.
  • 6COURTOIS N T,MEIER W.Algebraic attacks on stream ciphers with linear feedback[A].Advances in Cryptology-Eurocrypt 2003[C].Berlin:Springer-Verlag,2003.345-359.
  • 7COURTOIS N T,KLIMOV A,PATARIN J,et al.Efficient algorithms for solving overdefined systems of multivariate polynomial equations[A].Advances in Cryptology-Eurocrypt 2000[C].Berlin:Springer-Verlag,2000.392-407.
  • 8KIPNIS A,SHAMIR A.Cryptanalysis of the hfe public key cryptosystem by relinearization[A].Advances in CryptologyCrypto'99[C].Berlin:Springer-Verlag,1999.19-30.
  • 9ADAMS W W,LOUSTAUNAU P.An introduction to grobner bases[M].USA:AMS,1994.
  • 10SUGITA M,KAWAZOE M,IMAI H.Relation between XL algorithm and grobner bases algorithms [EB/OL].http://eprint.iacr.org/2004/112,2004.

同被引文献127

引证文献6

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部