摘要
该文基于对Shannon算法非线性反馈移存器反馈函数和非线性滤波函数进行线性逼近,得到了优势为2-28的32个新的区分器,给出了一个对流密码算法Shannon的新的线性区分攻击。该区分攻击大约需要2 52密钥字就能将Shannon算法的密钥流序列从随机序列中区分出来。
A new distinguishing attack is presented on Shannon algorithm.The distinguish attack is built by using linear approximations of both the non-linear feedback shift register and the non-linear filtration function,and 32 distinguishers are derived which the bias is.Therefore,the Shannon algorithm is distinguishable from truly random cipher after observing keystreams words on average.
出处
《电子与信息学报》
EI
CSCD
北大核心
2011年第1期190-193,共4页
Journal of Electronics & Information Technology
关键词
序列密码
区分攻击
线性逼近
非线性反馈移存器
Shannon算法
Stream ciphers
Distinguishing attack
Linear approximations
Non-linear Feedback Shift Register(NFSR)
Shannon algorithm