期刊文献+

Fast correlation attack on streamcipher ABC v3 被引量:7

Fast correlation attack on stream cipher ABC v3
原文传递
导出
摘要 ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is 128 bits. In this paper, we find large numbers of new weak keys of ABC family and introduce a method to search for them, and then apply a fast correlation attack to break ABC v3 with weak keys. We show that there are at least 2^103.71 new weak keys in ABC v3. Recovering the internal state of a weak key requires 236.05 keystream words and 2^50.56 operations. The attack can be applied to ABC vl and v2 with the same complexity as that of ABC v3. However, the number of weak keys of ABC vl as well as ABC v2 decreases to 2^97 + 20^95.19,It reveals that ABC v3 incurs more weak keys than that of ABC vl and v2. ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is 128 bits. In this paper, we find large numbers of new weak keys of ABC family and introduce a method to search for them, and then apply a fast correlation attack to break ABC v3 with weak keys. We show that there are at least 2^103.71 new weak keys in ABC v3. Recovering the internal state of a weak key requires 236.05 keystream words and 2^50.56 operations. The attack can be applied to ABC vl and v2 with the same complexity as that of ABC v3. However, the number of weak keys of ABC vl as well as ABC v2 decreases to 2^97 + 20^95.19,It reveals that ABC v3 incurs more weak keys than that of ABC vl and v2.
出处 《Science in China(Series F)》 2008年第7期936-947,共12页 中国科学(F辑英文版)
基金 the National Natural Science Foundation of China (Grant Nos.90604036 and 60525201) the 973 Project (Grant No.2007CB807902)
关键词 CRYPTANALYSIS stream cipher fast correlation attack ABC v3 cryptanalysis, stream cipher, fast correlation attack, ABC v3
  • 相关文献

参考文献11

  • 1Willi Meier,Othmar Staffelbach.Fast correlation attacks on certain stream ciphers[J].Journal of Cryptology.1989(3)
  • 2Anashin V,Bogdanov A,Kizhvatov I.ABC—-a new fast flexible stream cipher specification, version 3. http:// www.ecrypt.eu.org/stream/p2ciphe-rs/abc/abc p2.pdf .
  • 3Anashin V,Bogdanov A,Kizhvatov I, et al.ABC: A new fast flexible stream cipher. http://www.ecrypt.eu.org/ stream/ciphers/abc/abc.pdf .
  • 4Berbain C,Gilbert H.Cryptanalysis of ABC. http://www.ecrypt.eu.org/stream/papersdir/048.pdf .
  • 5Khazaei S.Divide and conquer attack on ABC stream cipher. http://www.ecrypt.eu.org/stream/papersdir/052.pdf .
  • 6http://crypto.rsuh.ru/papers/abc-spec-v2.pdf .
  • 7http://www.ecrypt.eu.org/stream/papersdir/2006/029.pdf .
  • 8Zhang H N,Wang S H,Wang X Y.Two linear expressions with probability advantages in symmetric ciphers. http://www.ecrypt.eu.org/strea-m/papersdir/2006/046.pdf .
  • 9Meier W,Staffelbach O.Fast correlation attacks on stream ciphers[].Journal of Cryptology.1989
  • 10Anashin V,Bogdanov A,Kizhvatov I.Increasing the ABC stream cipher period. http://www.ecrypt.eu.org/ stream/ papersdir/050.pdf .

同被引文献60

  • 1朱华安,谢端强.基于m序列统计特性的序列密码攻击[J].通信技术,2003,36(8):96-98. 被引量:6
  • 2杨忠立,刘玉君.自同步扰乱序列的综合算法研究[J].信息技术,2005,29(2):30-32. 被引量:13
  • 3唐樨瑾,冯勇.Dixon结式在密码学中的应用[J].软件学报,2007,18(7):1738-1745. 被引量:9
  • 4SIEGENTHALER T. Decrypting a class of stream ciphers using ciphertext only[J]. IEEE Trans Comput, 1985, C-34(1): 81-85.
  • 5MEIER W, STAFFELBACH O. Fast correlation attacks on certain stream ciphers[J]. Journal of Cryptology, 1989, 1(3): 159-176.
  • 6MEIER W, STAFFELBACH O, Fast correlation attacks on certain stream ciphers[M/CD]. [2009-05-22]. http://portal. acm.org/citation.cfm?id=55582.
  • 7CHEPYZHOV V, SMEETS B. On a fast correlation attack on certain stream ciphers[M/CD]. [2009-05-22]. http://portal. acm.org/.
  • 8MIHALJEVIC M J, Jovan D J G, A comparison of cryptanalytic principles based on iterative error correction[M/CD]. [2009-05-12]. http://portal.acm.org/.
  • 9MIHALJEVIC M J, GOLIC J Dj. Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence[M/CD]. [2009-05-22]. http://portal.acm. org/.
  • 10ZIVKOVIC M V. On two probabilistic decoding algorithms for binary linear codes[J]. IEEE Trans Inform Theory, 1991, 37: 1707-1716.

引证文献7

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部