期刊文献+

流密码Grain v1的密钥恢复攻击及其改进 被引量:1

Key Recovery Attack on Stream Cipher Grain v1 and Its Improvement
下载PDF
导出
摘要 为探讨流密码Grain v1的安全性,通过研究Grain v1密钥流生成器的结构,指出了Grain v1密钥流生成器设计的3个弱点,在此基础上提出了一种基于中间状态的流密码Grain v1的密钥恢复攻击.该攻击的计算复杂度和空间复杂度分别等价于Grain v1密钥流生成器的计算复杂度和空间复杂度.为了抵抗所提出的攻击,对Grain v1密钥流生成器的设计进行了改进.安全性分析表明,改进设计能够抵抗所提出的密钥恢复攻击. In order to probe into the security of the stream cipher Grain v1,three design weaknesses of the Grain v1 key-stream generator were pointed out by studying its structure.Based on the above work,a key recovery attack on the stream cipher Grain v1 with an intermediate state was proposed.Time complexity and memory complexity of the proposed attack are equal to the time complexity and memory complexity of the Grain v1 key-stream generator respectively.In order to resist the proposed attack,an improvement on the Grain v1 key-stream generator was made.The security analysis shows that the improved generator is secure against the proposed key recovery attack.
出处 《西南交通大学学报》 EI CSCD 北大核心 2010年第5期745-750,共6页 Journal of Southwest Jiaotong University
基金 国家自然科学基金资助项目(60673072 60803149) 国家973计划资助项目(2007CB311201) 广西信息与通讯技术重点实验室开放基金资助项目(20902)
关键词 密码分析 线性移位寄存器 布尔函数 流密码Grain cryptanalysis linear feedback shift register Boolean function stream cipher Grain
  • 相关文献

参考文献19

  • 1叶峰,袁家斌.AES加密算法的密钥搜索量子线路设计[J].西南交通大学学报,2010,45(2):302-306. 被引量:6
  • 2袁丁,范平志.基于椭圆曲线的不可否认门限代理签名方案[J].西南交通大学学报,2007,42(1):8-12. 被引量:1
  • 3LU Y,VAUDENAY S.Cryptanalysis of bluetooth keystream generator two-level E0[C]∥Proc.of the 10th International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2004:483-499.
  • 4MAXIMOV A A,JOHANSSON T,BABBAGE S.An improved correlation attack on A51/2[C]∥Proc.of the 11th International Workshop on Selected Areas in Cryptography.Berlin:Springer,2005:1-18.
  • 5HELL M,JOHANSSON T,MEIER W.Grain-a stream cipher for constrained environments[EB/OL].(2008-11-05)[2009-01-12].http://www.ecrypt.eu.org/stream/grainp3.html.
  • 6HELL M,JOHANSSON T,MEIER W.A stream cipher proposal:Grain-128[EB/OL].(2007-09-06)[2009-01-12].http://www.ecrypt.eu.org/stream/p3ciphers/grain/Grain128 p3.pdf.
  • 7KHAZAEI S,HASSANZADEH M,KIAEI M.Distinguishing attack on Grain[EB/OL].(2005-12-01)[2009-01-12].http://www.ecrypt.eu.org/stream/papersdir/071.pdf.
  • 8BERBAIN C,GILBERT H,MAXIMOV A.Cryptanalysis of Grain[C]∥Proc.of the 13th International Workshop on Fast Software Encryption.Berlin:Springer,2006:15-29.
  • 9LEE Y,JEONG K,SUNG J.Related-key chosen IV attacks on Grain-v1 and Grain-128[C]∥Proc.of the 13th Australasian Conference on Information Security and Privacy.Berlin:Springer,2008:321-335.
  • 10SIEGENTHALER T.Decrypting a class of stream ciphers using ciphertext only[J].IEEE Trans.on Computers,1985,C-34(1):81-84.

二级参考文献32

  • 1吴楠,宋方敏.量子计算与量子计算机[J].计算机科学与探索,2007,1(1):1-16. 被引量:19
  • 2李盼池,李士勇.一种Grover量子搜索算法的改进策略[J].智能系统学报,2007,2(1):35-39. 被引量:6
  • 3FEYNMAN R.Simulating physics with computers[J].Int.J.Theor.Phys.,1982,21(6):467-488.
  • 4OKSIN M,CHONG F,CHUANG I.A practical architecture for reliable quantum computers[J].IEEE Computer,2002,35(1):79-87.
  • 5NIELSEN M A,CHUANG I L.量子计算和量子信息(一)--量子计算部分[M].赵千川译.北京:清华大学出版社,2004:29-247.
  • 6SHOR P W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantumcomputer[J].SIAM j.Comp.,1997,26(5):1484-1509.
  • 7GROVER L K.Quantum mechanics helps in searching for a needle in a haystack[J].Phys.Rev.Lett.,1997,79(2)g 325-329.
  • 8GROVER L K.Quantum computers can search rapidly by using almost any transformation[J].Phys.Rev.Lett.,1998,80(29):4329-4332.
  • 9BIHAM O,SHAPIRA D,SHIMONI Y.Analysis of Grover's quantum search algorithm a dynamical system[J].Phys.Rev.A,2003,68(2):2326-2333.
  • 10RIVEsT R L,SHAMIR A,ADLEMAN L M.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.

共引文献5

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部