期刊文献+

采样攻击的最短采样距分析 被引量:2

Analysis of the Minimum Decimation Distance of Decimation Attack
下载PDF
导出
摘要 采样攻击是针对序列密码的一种攻击方法。该文对本原线性反馈移存器(LFSR)序列的采样攻击方法进行了研究,给出了采样距与被采序列和采出序列的线性复杂度之间的制约关系,给出了能使采出序列的线性复杂度小于被采序列的线性复杂度的最短采样距,给出了能成功实施采样攻击需要的最少已知明文量,并据此分析了对本原LFSR序列进行采样攻击的实际可行性,证明了只有当本原LFSR的级数很小时,该方法才可能有实用价值。 Decimation attack is one attack method of stream ciphers. In this paper, the decimation attack to prime Linear Feedback Shift Register(LFSR) sequences is investigated. The connection of decimation distance and the linear complexity of the original sequence and the decimate sequence is presented. The minimum decimate distance that makes the linear complexity of the decimate sequence less than that of the original sequence is obtained. The minimum known plaintext amount for decimation attack is given, and the practical feasibility of the decimation attack to prime LFSR's is analyzed. It is proved that the decimation attack to prime LFSR is useful possibly only in the case that the degree of LFSR is very small.
出处 《电子与信息学报》 EI CSCD 北大核心 2008年第3期665-667,共3页 Journal of Electronics & Information Technology
基金 河南省杰出青年科学基金(0312001800)资助课题
关键词 序列密码 线性反馈移位寄存器 M序列 采样攻击 Stream cipher Linear feedback shift register m sequnce Decimation attack
  • 相关文献

参考文献4

  • 1Filiol E. Decimation attack of stream ciphers[A]. In: Proceedings of the First International Conference in India-INDOCRYPT' 2000, Lecture Notes in Computer Science 1977, Springer Verlag, 2000. Also available from http: //eprint. iacr. org/2000/040. ps.
  • 2肖国镇,梁传甲,王育民.伪随机序列及其应用[M].北京:国防工业出版社,1985年,第二章.
  • 3Rueppel R A. Analysis and Design of Stream Ciphers[M]. Springer Verlag, 1986, Ch. 6..
  • 4陈欣,李保红.模n 剩余类环中元素的周期分布规律[J].信阳师范学院学报(自然科学版),2000,13(1):4-6. 被引量:2

二级参考文献1

共引文献1

同被引文献17

引证文献2

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部