期刊文献+

针对LEX算法的截断滑动攻击 被引量:5

Interruption Slide Attack against Stream Cipher LEX Algorithm
原文传递
导出
摘要 论文讨论了滑动攻击的基本原理,提出了截断滑动攻击的概念,利用截断滑动攻击分析了改进的LEX流密码算法。针对截断滑动攻击对LEX算法安全性的影响,文章对改进的LEX的密钥扩展方案做了修改,使滑动攻击和截断滑动攻击对改进的LEX不再有效。 This paper discusses the basic principle of the slide attack thought, and proposes a concept of the interruption slide attack. It then analyzes the security of improved stream cipher LEX algorithm by applying the interruption slide attack. In accordance with the influences of interruption slide attack on the security of LEX, the key scheme algorithm of LEX is modified so that the slide attack and interruption slide attack against LEX is no longer of effects.
作者 尤加勇 李超
出处 《信息安全与通信保密》 2007年第9期96-98,共3页 Information Security and Communications Privacy
关键词 滑动攻击 截断滑动攻击 LEX ECRYPT slide attack interruption slide attack LEX ECRYPT
  • 相关文献

参考文献6

  • 1[1]Biryukov A,Wagner D.Slide Attacks[A].Preproceedings of FSE6,FastSoftware Encryption Workshop 1999.
  • 2[2]Biryukov A,Wagner D.Advanced slide attacks[A].Advances in Cryptology-Eurocrypt'00[C],Berlin:Springer-Veriag,2000,589~606.
  • 3[3]Biryukov A.The Design of A Stream Cipher LEX.Selected Areas in Cryptography SAC2006,Preproceedings.
  • 4[4]Wu H,Preneel B.Attacking the Ⅳ Setup of Stream Cipher LEX,in Proceedings of Fast Software Encryption-FSE'06(M.Robshaw,ed.),Lecture Notes in Computer Science,Springer-Verlag,2006.
  • 5[5]Wu H,Preneel B.Resynchronization Attacks on WG and LEX,In:M.Robshaw editor,Fast Software Encryption 2006.
  • 6[6]Biryukov A.A New 128bit Key Stream Cipher LEX,ECRYPT Stream Cipher Project Report 2005/013.Available at http://www.ecrypt.eu.org/stream/.

同被引文献28

  • 1吴文玲,冯登国.分组密码工作模式的研究现状[J].计算机学报,2006,29(1):21-36. 被引量:40
  • 2张文涛.分组密码的分析与设计[J]模式的研究现状[J].计算机学报,2006,29(1):22-25.
  • 3Biryukov A.A new 128 bit key stream cipher LEX[EB/OL]. (2005-06-13 ).http://www.ecrypt.eu.org/stream/ciphers/lex/ lex.pdf.
  • 4Wu Hong-jun, Preneel B.Attacking the IV setup of stream cipher LEX[EB/OL]. (2005-09-07) .http://www.ecrypt.eu.org/ stream/papersdir/059.pdf.
  • 5Joan D, Vincent R.The design of Rijindael AES: the ad-vancedencryptionstandard[M].谷大武,译.北京:清华大学出版社,2003:41-52.
  • 6张中亚,关杰.对流密码算法LEX的差分故障攻击[J].上海交通大学学报:自然版,2012,46(6):865-869.
  • 7Biryukov A. The design of a stream ciher LEX[ C]//Selected Areas inCryptography. Berlin Heidelberg:Springer Verlag,2007:67 -75.
  • 8Wu H J, Preneel B. Resynchronization attacks on WG and LEX [ J ].Lecture Notes in Computer Science,2006,4047:422 -432.
  • 9Dunkelman 0,Keller N. A New Attack on the LEX Stream Cipher[ J].Lecture Notes in Computer Science,2008,5350;539 -556.
  • 10Dunkelman 0, Keller N. Cryptanalysis of the Stream Cipher LEX [ J ].Designs,Codes and Cryptography. March 2012,Published online.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部