期刊文献+

针对SOSEMANUK的猜测-确定攻击 被引量:3

Guess and Determine Attack on SOSEMANUK
下载PDF
导出
摘要 通过分析流密码算法SOSEMANUK的一个设计弱点,提出一种针对SOSEMANUK密钥流生成器的猜测-确定攻击。该攻击只需要猜测7个32 bit内部状态变量,就可以确定唯一的12个状态变量,攻击算法只需要6个密钥字且计算复杂度为O(2196)。攻击结果表明,该设计存在安全漏洞,SOSEMANUK抗猜测-确定攻击的计算复杂度远低于O(2256)。 By analyzing the weakness in design of the stream cipher SOSEMANUK, this paper presents Guess and Determine on it. It guesses 7-words internal state, each word contains 32 bit, and then all the internal state can be achieved, the process requires only 6 keystream words. Guess and Determine attack on the cipher is introduced with a computational complexity of O(2196). The results show that the equation which is analyzed exists security vulnerabilities, moreover the computational complexity of attack is far lower than O(2:56).
出处 《计算机工程》 CAS CSCD 北大核心 2011年第4期170-171,192,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60833008)
关键词 流密码 SOSEMANUK算法 猜测 确定攻击 密钥流 stream cipher SOSEMANUK algorithm Guess and Determine attack keystream
  • 相关文献

参考文献8

  • 1Berbain C, Billet O, Canteaut A, et al. SOSEMANUK: A Fast Software-oriented Stream Cipher[M]//New Stream Cipher Designs: The eSTREAM Finalists. Berlin, Germany: Springer-Verlag, 2008.
  • 2李昌刚,张昕,朱芳来,应艳杰,汪永斌.一种新的密钥流发生器设计算法[J].计算机工程,2007,33(10):138-140. 被引量:3
  • 3Ekdahl E Johansson T. A New Version of the Stream Cipher SNOW[C]//Proc. of SAC'03. Berlin, Germany: Springer-Verlag, 2003.
  • 4Biham E, Anderson R, Knudsen L. SERPENT: A New Block Cipher Proposal[C]//Proc. of FSE'98. Berlin, Germany: Springer- Verlag, 1998.
  • 5Lee Jung-Keun, Lee Dong-Hoon, Park S. Cryptanalysis of Sosemanuk and SNOW2.0 Using Linear Masks[C]//Proc. of Cryptology-ASIACRYPT'08. Berlin, Germany: Springer-Verlag, 2008.
  • 6Tsunoo Y, Saito T, Shigeri M, et al. Evaluation of SOSEMANUK with Regard to Guess and Determine Attacks[EB/OL]. (2006-01-02). http://www.ecrypt.eu.org/streamlpapersdir/20061009.pdf.
  • 7Ahmadi H, Eghlidos T, Khazaei S. Improved Guess and Determine Attack on SOSEMANUK[EB/OL]. (2005-12-25). http://www. ecrypt.eu.org/stream/papersdir/085.pdf.
  • 8Ding Lin, Guan Jie. Guess and Determine Attack on SOSEMAN- UK[C]//Proc. of ISA'09. Xi'an, China: [s. n.], 2009.

二级参考文献5

  • 1Reeds J A.Cracking Random Number Generator[J].Cryptologia,1977,1(1):20-26.
  • 2Schneier B.Applied Cryptography:Protocols,Algorithms and Source Code[M].北京:机械工业出版社,2000-01.
  • 3Yin Y.The RC5 Encryption Algorithm[C]//Proceedings of the 2nd International Workshop on Fast Software Encryption.1994:86-96.
  • 4Stallings W.Cryptography and Network Security Principles and Practice[M].杨明,胥光辉,译.北京:电子工业出版社,1989:18-110.
  • 5Diffie W,Hellman M E.New Directions in Cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.

共引文献2

同被引文献31

  • 1BERBAIN C,BILLET O,CANTEAUT A,et al.Sose-manuk,a fast software-oriented stream cipher[EB/OL].[2005-05-26].Cryptology ePrint Archiive,http://www.ecrypt.eu.org/2005/027.pdf.
  • 2AHMADI H,EGHLIDOS T,KHAZAEI S.Improved guess anddetermine attack on Sosemanuk[EB/OL][2005-12-25].http://www.ecrypt.eu.org/stream/sosemanukp3.html.
  • 3TSUNOO Y,SAITO T,SHIGERI M.Evaluation of Sose-manuk with regard to guess-and-determine attacks[EB/OL].[2006-01-02].http://www.ecrypt.eu.org/stream/sosemanukp3.html.
  • 4DING Lin,GUAN Jie.Guess and determine attack on Sose-manuk[C]//Fifth International Conference on Information As-surance and Security-CIAS2009.Xi'an,China,2009:658-661.
  • 5FENG Xiutao,LIU Jun,ZHOU Zhaocun,et al.A byte-based guess and determine attack on Sosemanuk[C]//Ad-vances in Cryptology-Asiacrypt 2010.LNCS 6477.Berlin:Springer-Verlag,2010:146-157.
  • 6LEE J K,LEE D H,PARK S.Cryptanalysis of sosemanukand SNOW 2.0 using linear masks[C]//Advances inCryptology-Asiacrypt 2008.LNCS 5350.Berlin:Springer-Verlag,2008:524-538.
  • 7CHO J Y,HERMELIN M.Improved linear cryptanalysis of So-semanuk[C]//Information,Security and Cryptology-ICISC2009.LNCS 5984.Berlin:Springer-Verlag,2010:101-117.
  • 8COPPERSMITH D,HALEVI S,JUTLA C.Cryptanalysis ofstream ciphers with linear masking[C]//Advances inCryptology-Crypto 2002.LNCS 2442.Berlin:Springer-Verlag,2002:515-532.
  • 9WATANABE D,BIRYUKOV A,CANNIERE C D.A dis-tinguishing attack of SNOW 2.0 with linear masking meth-od[C]//Selected Areas in Cryptography-SAC 2003,LNCS 3006.Berlin:Springer-Verlag,2004:222-233.
  • 10NYBERG K,WALLEN J.Improving linear distinguishersfor SNOW 2.0[C]//Fast Software Encryption-FSE 2006,LNCS 4047.Berlin:Springer-Verlag,2006:114-162.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部