期刊文献+

流密码中的单圈T-函数 被引量:1

Single-Cycle T-functions in Stream Cipher
原文传递
导出
摘要 T-函数由于具有计算速度快、密码学性质良好等特点而得到广泛应用,先后用于构造分组密码、Hash函数和流密码。单圈T-函数可以用来代替流密码中的线性反馈移位寄存器,逐渐用来构建新的流密码体制。文中介绍了单圈T-函数的性质,概括了长周期单圈T-函数已知的三种类型,推广了T-函数的定义,有利构造新的长周期单圈T-函数。并总结了关于单圈T-函数值得进一步研究的几个问题。 T-function,due to its high computing speed and excellent properties in cryptography,is now widely applied for constructing the block cipher,Hash function and stream cipher.T-function could be used to replace the linear feedback shift register in stream cipher and to construct new stream ciphers gradually.This paper describes the properties of single-cycle T-function,summarizes three kinds of known single-cycle T-function with long periods,and popularizes the definition of T-functions.All these are beneficial to the construction of single-cycle T-function with long periods.This article also summarizes some problems of single-cycle T-function worthy of further study.
作者 何元禹
出处 《通信技术》 2010年第3期165-167,共3页 Communications Technology
关键词 流密码 单圈函数 T-函数 广义T-函数 stream cipher single-cycle function T-function generalized T-function
  • 相关文献

参考文献15

  • 1冯登国.NESSIET程简介.信息安全与通信保密,2003,(03):1-4.
  • 2冯登国 裴定一.密码学导引[M].北京:科学出版社,2001.230-231.
  • 3Schnorr C P,Vaudenay S.Black Box Cryptanalysis of Hash Networks Based on Multipermutations[J].Eurocrypt,1994(950):94-94.
  • 4Klimov A,Shamir A.A New Class of Invertible Mappings[J].LNCS,2002(2523):470-483.
  • 5Klimov A.Applications of T-functions in Cryptography[D].The State of Israel:Weizmann Institute of Science,2005.
  • 6Klimov A,Shamir A.Cryptographic Applications of T-functions[J].LNCS,2003(3006):248-261.
  • 7Alexander Elimov,Adi Shaeir.New Cryptographic Primitives Based on Multiword T-Functions[J].LNCS,2004(3017):1-15.
  • 8Maximov A.A New Stream Cipher:Mir-1[DB/OL].[2005-01-10][2008-04-20].http://www.ecrypt.eu.org/stream.
  • 9Courtois N,Meier W.Algebraic Attacks on Stream Ciphers with Linear Feedback[J].Advances in Cryptology-Eurocrypt,2003(2656):345-359.
  • 10Courtois N.Fast Algebraic Attacks on Stream Ciphers with Linear Feedback[J].LNCS,2003(2729):176-194.

二级参考文献6

  • 1Klimov A, Shamir A. A new class of invertible mappings [C] // Workshop on Cryptographic Hardware and Embeded Systems ' 02, LNCS. [ S. l. ] : Springer-Verlag, 2003 : 470-483.
  • 2Kolokotronis N. Cryptographic properties of stream ciphers based on T-functions[C] // ISIT 2006. USA. IEEE, 2006: 1604-1608.
  • 3Zhang Wenying, Wu Chuankun. The algebraic normal form, linear complexity and k-error linear complexity of single cycle T-function [ DB/OL]. Heidelberg: Springer Berlin, 2005 [ 2007-09-02 ]. http://www. springerlink. com/index/x8t648x51124p087. pdf.
  • 4Molland H, Helleseth T. A linear weakness in the Klimov-Shamir T-function[ C] //Proc IEEE Syrup Inf Theory. Spain: IEEE Transactions on Information Theory Society, 2005. 1106-1110.
  • 5Kurosawa K, Sato F, Sakata T, et al. A relationship between linear complexity and k-error linear complexity [J]. IEEE Trans Inf Theory, 2000, 46(2). 694-698.
  • 6Games R A, Chan A H. A fast algorithm for determining the complexity of a binary sequence with period 2^n [J]. IEEE Trans Inf Theory, 1983, 29(4) : 144-146.

共引文献34

同被引文献15

  • 1KNUH D E. Seminumerical Algorithms[M]. The Art of ComputerProgramming(Volume 2)Massachusetts : Addison, 1981.
  • 2MARSAGLIA G. DIEHARD Statistical Tests[EB/OL]. [2012-02-16]. http: //stat.fsu.edu/geo/diehard.html.
  • 3Information Security Institute. Crypt-X[EB/OL]. [2012-02-16]. http: //www.isi.qut.edu.au/resources/cryptx/.
  • 4RUKIN A, SOTO J, NECHVATAL J, et al. A Statistical Test Suit for Random and Pseudorandom Number Generators for Cryptographic Applications(NIST Special Publication(800-22) [EB/OL]. [2012-02-16]. http: //www.nist.gov.
  • 5TURAN M S, DOGANAKSOY A, CALIK C. Statistical Analysis of Synchronous Stream Ciphers[EB/OL]. [2012-02- 16]. http: //www.ecrypt.eu.org/stream/pqpersdir/2006/012.pdf.
  • 6FILIOL E. A New Statistical Testing for Symmetric Ciphers and Hash Functions[C]//International Conference on Information, Communications and Signal Processing. [s.1.]: Springer, 2001: 21-35.
  • 7SAARINEN M-J O. Chosen-iv Statistical Attacks on Estream Stream Ciphers[C]//ECRYPT Stream Cipher Project,Report2006/013, 2006: 5-19.
  • 8ENGLUND H, JOHANSSON T, TURAN M S. A Framework for Chosen IV Statistical Analysis of Stream Ciphers[C]// INDDOCRYPT 2007. [s.1.]: Springer, 2007: 268-281.
  • 9李超,屈龙江,周悦.密码函数的安全性指标分析[M].北京:科学出版社,2011:1-15.
  • 10李贤平.概率论基础(第二版)[M].北京:高等教育出版社,2006:251-319.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部