期刊文献+

对XW混沌密码算法的分割攻击 被引量:6

Divide-and-conquer attack on XW chaotic cipher
下载PDF
导出
摘要 分析了徐淑奖等人提出的一类混沌迭代加密算法的安全性,发现该加密算法由混沌映射产生的量化序列的前几个量化值对混沌初始值低位比特的变化不够敏感,据此提出了在选择明文攻击条件下由量化序列恢复混沌初始值的先攻击高位比特再攻击低位比特的分割攻击方法。在参数r=4已知且密钥长度为64 bit的条件下,分割攻击算法仅需1个选择明密对,其成功率为0.930 5,计算复杂性约为219.7,存储复杂性约为211.6。 For a block cryptosystem based on iterating chaotic map proposed by Xu Shu-jiang et al.,this paper found that the first several bits in quantified sequence generated by chaotic sequence were not sensitive to the least significant bits of chaos initial state.Under the chosen plaintexts attack,based on this information leakage,this paper proposed a divide-and-conquer attack to recover the chaos initial state from the consecutive segment of quantified sequence via attacking the higher significant bits first and the lower significant bits second.When the parameter r= 4 and the length of key is of 64-bit length,the success probability of the divide-and-conquer attack is 0.930 5 and the computational complexity is about 219.7,the memory complexity is about 211.6 and the data complexity is 1 chosen plaintext-ciphertext pair.
出处 《计算机应用研究》 CSCD 北大核心 2010年第7期2625-2628,共4页 Application Research of Computers
基金 河南省杰出青年科学基金资助项目(0312001800)
关键词 密码学 混沌密码 密码分析 分割攻击 cryptography chaotic cipher cryptanalysis divide-and-conquer attack
  • 相关文献

参考文献9

二级参考文献26

  • 1周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 2[4]Fukumasa H., Kohno R., Imai H.. Design of pseudonoise sequences with good odd and even correlation properties for DS/CDMA. IEEE Journal of Selected Areas in Communications, 1994, 12(5) :828~836
  • 3[5]Kohda T., Tsuneda A.. Statistics of chaotic binary sequences. IEEE Tranactions on Information Theory, 1997, 43(1):105~112
  • 4[6]Kohda T., Tsuneda A.. Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Transactions on Communications,1993, E76-B(8):855~862
  • 5[7]Andreyev Y., Dmitriev A.S., Kuminov D., Starkov S.. Maps with stored information in multiple-access communications systems. In: Proceedings of the NDES'97,Communication, 1997, 185~190
  • 6[11]Hammons R.A., Kumar V.P.. On a recent 4-Phase sequence design for CDMA. IEICE Transactions on Communications, 1993, E76-B (8) :804~813
  • 7[13]Gonzalez J.A., Pino R.. Chaotic and stochastic functions. Physica A, 2000, 276: 425~432
  • 8[1]Lasota A., Mackey M.C.. Chaos, Fractals and Noise. New York: Springer-Verlag, 1994
  • 9[2]Matthews R. A. J.. On the derivation of a "chaotic" encryption algorithm. Cryptologia, 1989, 13: 29~42
  • 10[3]Mitchell D.E.. Nonlinear key generators. Cryptologia, 1990, 14: 350~354

共引文献111

同被引文献55

引证文献6

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部