期刊文献+

流密码典型分析方法及实例 被引量:3

Typical Methods and Examples of Stream Cipher Analysis
原文传递
导出
摘要 流密码的设计与分析在现代密码学中占有重要地位。简要介绍了流密码分析的基本原理和模型,主要包括:折中攻击、猜测和决定攻击、相关攻击、最佳仿射攻击、代数攻击和边信道攻击。然后基于Mathematica平台,使用简易密钥流发生器为测试对象,对其中的折中攻击、猜测和决定攻击及相关攻击进行了仿真实现。通过实验,揭示了流密码算法的一个重要设计原则:避免内部状态演变的线性性以及输出序列统计性质的偏向性。最后对流密码分析方法给予了总结和展望。 The design and analysis of stream cipher plays an important role in modern cryptology. This paper briefly reviews the basic principle and model of stream cipher analysis, mainly including TMD tradeoff attack, guess-and-determine attack, correlation attack, BAA attack, algebraic attack and side-channel attack. Then simulations of TMD tradeoff attack, guess-and-determine attack and correlation attack are performed by using Mathematical kit software, with results and a part of codes appended. The tests reveal an important design principle: it is critical to avoid the linear evolvement of internal state and eliminate the biased statistical properties of keystream. Finally some conclusions and prospects of stream cipher analysis are provided.
出处 《信息安全与通信保密》 2010年第6期87-89,92,共4页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(批准号:60672068)
关键词 TMD折中攻击 猜测与决定攻击 DC攻击 相关攻击 BAA攻击 TMD tradeoff attack guess-and-determine attack DC attack correlation attack BAA attack
  • 相关文献

参考文献8

  • 1刘依依.eSTREAM和流密码分析现状[J].信息安全与通信保密,2009,31(12):47-49. 被引量:13
  • 2Biryukov A,Shamir A.Time/Memory/Data Tradeoffs for Stream Ciphers[C]//Springer-Verlag.Proceedings of ASIACRYPT 2000.Germany:Springer-Verlag,2000:01-13.
  • 3Biryukov A,Shamir A,Wagner D.Real Time Cryptanalysis of A5/1 on a PC[C]//Springer-Verlag.Proceedings of PKC 2001.Germany:Springer-Verlag.2001:37-44.
  • 4Patrik Ekdahl.On LFSR Based Stream Ciphers:Analysis and Design[D].Lund:Lund University,2003.
  • 5Yi Lu,Willi Meier,Serge Vaudenay.The Conditional Correlation Attack:A Practical Attack on Bluetooth Encryption[C],,Springer-Verlag.Crypto 2005.Germany:Springer-Vedag.2005:97-117.
  • 6Courtois N T.General Principies of Algebraic Attacks and New Design Criteria for Cipher Components[C]//Springer-Verlag.AES 2004.Germany:Springer-Verlag,2005:67-83.
  • 7Christophe De Canniere,Bart Preneel.Trivium Specifications[EB/OL].(2007-03-29)[2009-11-201.http://www.ecrypt.en.org/stream/p3ciphers/trivium/trivium_p3.pdf.
  • 8Meltem Sonmez Turan,Ali Doanaksoy,Cagdas Cahk.Statistical Analysis of Synchronous Stream Ciphers[EB/OL].(2006-02-13)[2009-11-20].http://www.ecrypt.eu.org/stream/papersdir/2006/012.pdf.

二级参考文献4

共引文献12

同被引文献28

  • 1刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(上)[J].信息安全与通信保密,2006,28(7):26-28. 被引量:7
  • 2DINUR I, SHAMIR A. Cube Attacks on Tweakable Black Box Polynomials[C]//EUROCRYPT 2009. [s.1.]: Springer, 2009 : 278-299.
  • 3MROCZKOWSKI P, SZMIDT J. The Algebraic Cryptanalysis of the Block Cipher Katan32 Using Modified Cube Attack[C]. Warsaw, Poland: Military University of Technology, 2011 : 345-354.
  • 4DINUR I, SHAMIR A. Breaking Grain-128 with Dynamic Cube Attacks[C]//Fast Software Encryption. [s.1.]: Springer, 2011: 167-187.
  • 5COURTOIS N. How Fast can be Algebraic Attacks on Block Ciphers?[EB/OL]. (2006-05-18)[2012-03-10]. http: // eprint.iacr.org/2006/168.
  • 6ALBRECHT M. Algebraic Attacks on the Courtois Toy Cipher[D]. Bermen, Germany: University of Bremen, 2006.
  • 7DUNKELMAN O, KELLER N. Linear Cryptanalysis of CTC[EB/OL]. (2006-07-22)[2012-03-10]. http: //eprint. iacr.org/2006/250.
  • 8DUNKELMAN O, KELLER N. Cryptanalysis of CTC2[C]// CT-RSA 2009.[s.1.]: Springer, 2009: 226-239.
  • 9MROCZKOWSKI P, SZMIDT J. The Cube Attack on Courtois Toy Cipher[EB/OL]. (2009-10-11)[2012-03-10]. http: //eprint.iacr.org/2009/497.
  • 10BLUM M, LUBY M, RUBINFELD R. Self-Testing/ Correcting with Applications to Numerical Problems[J]. Journal of Computer and System Sciences, 1993, 47: 549-595.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部