期刊文献+

模2加整体逼近二元和三元模2^n加的噪声函数分析 被引量:12

Analysis of the Noise Functions of Macrocosm Approximation of Binary Addition and Triple Addition Modulo 2^n with XOR
下载PDF
导出
摘要 整体逼近就是用一个弱密码函数替代一个强密码函数的攻击方法,这两个函数的模2和称为该整体逼近的噪声函数。该文研究了模2加整体逼近二元模2^n加和三元模2^n加时噪声函数的概率分布,给出了噪声函数的概率分布的计算公式以及噪声函数的概率值的平方和的计算公式。这些结果有助于掌握二元模2^n加和三元模2^n加对抗模2加的整体逼近攻击的能力。 Macrocosm approximation is a class of attacks to weak cipher function. The XOR of the two functions is called ciphers by replacing a strong cipher function with a the noise function of this macrocosm approximation. This paper studies the probability distributions of the noise functions produced by macrocosm approximation of binary addition and triple addition modulo 2- with XOR, and gives the computation formulae of the probability distributions of the corresponding noise functions and the square sums of the probabilities, which is helpful to recognize the ability of resistance to macrocosm approximation of binary addition and triple addition modulo 2- with XOR,
出处 《电子与信息学报》 EI CSCD 北大核心 2008年第6期1445-1449,共5页 Journal of Electronics & Information Technology
基金 河南省杰出青年科学基金(0312001800)资助课题
关键词 模2^n加 噪声函数 线性逼近 区分攻击 概率分布 整体逼近 Addition modulo 2^n Noise function Linear approximation Distinguishing attack Probability distribution Macrocosm approximation
  • 相关文献

参考文献13

  • 1Matsui M. Linear cryptanalysis method for DES cipher. In Advances in Cryptology-Eurocrypt 1993, LNCS 3788: 386-397.
  • 2Wallen J. Linear approximations of addition modulo 2^n. In Fast Software Encryption 2003, LNCS 2887: 261-273.
  • 3郭建胜,金晨辉.逐位模2加运算与模2^n加运算的相容程度分析[J].高校应用数学学报(A辑),2003,18(2):247-250. 被引量:10
  • 4Sekar G, Paul S, and Preneel B. Distinguishing attacks on the stream cipher Py. ESTREAM, ECRYT Stream Cipher Project, report 2005/081, 2005.
  • 5Biham E and Seberry J. Py(Roo): A fast and secure stream cipher using rolling arrays. ESTREAM, ECRYT Stream Cipher Project, report 2005/023, 2005.
  • 6Crowley P. Improved cryptanalysis of PY. ESTREAM, ECRYT Stream Cipher Project, report 2006/010, 2006.
  • 7Maximov A and Johansson T. Fast computation of large distributions and its cryptographic applications. In Advances in Cryptology -Asiacrypt 2005, LNCS 3788: 313-332.
  • 8Watanabe D, Biryukov A, and De Canniere C. A distinguishing attack of SNOW 2.0 with linear masking method. In Selected Areas in Cryptography SAC 2003, Springer Verlag, 2003: 222-233.
  • 9Ekdahl P and Johansson T. A new version of the stream cipher Snow. In Selected Areas in Cryptography SAC 2002, LNCS 2595: 47-61.
  • 10Englund H and Maximov A. Attack the Dragon. http:// crypto/streamciphers/dragon-256/062, pdf, 2005.

二级参考文献4

  • 1Willi Meier. On the security of the IDEA block cipher[ A ]. Advances in Cryptology-EUROCRYPT'93 [C]. Berlin, Hedelberg ,New York :Springer-Verlag, 1993, 371-386.
  • 2Lai X,Massey J L. A Proposal for a new block encryption standard[A]. Advances in Cryptology-EUROCRYPT'90[C]. Berlin .Hedelberg .New York :Springer-Verlag 1991,389-440.
  • 3Lai X. On the design and security of block ciphers[A]. In: Massey J L ed., ETH Series in Information Proceeding[C]. Vol. 1. 1992,225-248.
  • 4Lai X,Massey J L, Murphy S. Markov ciphers and differential cryptanalysis [A]. Advances in Cryptology-EUROCRYPT' 91[C]. Berlin, Hedelberg, New York :Springer-Verlag, 1991,17-38.

共引文献9

同被引文献81

  • 1金晨辉,高海英.对两个基于混沌的序列密码算法的分析[J].电子学报,2004,32(7):1066-1070. 被引量:28
  • 2刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(上)[J].信息安全与通信保密,2006,28(7):26-28. 被引量:7
  • 3张龙,吴文玲,温巧燕.mod 2^n加运算与F2上异或运算差值的概率分布和递推公式[J].北京邮电大学学报,2007,30(1):85-89. 被引量:12
  • 4Doug W, Bruce S, and Stefan L, et al.. Helix: Fast encryption and authentication in a single cryptographic primitive [C]. Fast Software Encryptiou 2003, LNCS 2887: 330-347.
  • 5Ekdahl P and Johansson T. SNOW-A new stream cipher[C]. First Open NESSIE Workshop, KU-Leuven, 2000. Submission to NESSIE. http://www.it.lth.se/cryptology/ snow/, 2000.
  • 6Dawson E and Chen K. Dragon: A fast word based stream cipher[C], eSTREAM, ECRYPT Stream Cipher Project, Report 2005/006, 2005. http://www.ecrypt.eu.org/stream.
  • 7Sekar G, Paul S, and Preneel B. Distinguishing attacks on the stream cipher Py[C]. eSTREAM, ECRYPT Stream Cipher Project, report 2005/081, 2005.
  • 8Crowley P. Improved cryptanalysis of Py[C]. eSTREAM, ECRYPT Stream Cipher Project, report 2006/010, 2006.
  • 9Joo Y C and Josef P. An Improved Distinguisher for Dragon[C]. eSTREAM, ECRYPT Stream Cipher Project, report 2007/002, 2007.
  • 10Baigneres T, Junod P, and Vandenay S. How far can we go beyond linear cryptanalysis IC]. Asiacrypt 2004, LNCS 3329: 432-450.

引证文献12

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部