期刊文献+

对Loiss算法的猜测确定分析 被引量:1

Guess-and-determine attacks on Loiss
下载PDF
导出
摘要 分析Loiss算法在抵御猜测确定攻击方面的安全性,并给出一个猜测确定攻击的方法.该攻击方法避免对Loiss算法中BOMM结构的寄存器进行直接猜测从而降低了攻击复杂度.最终攻击的时间复杂度为O(2247),数据复杂度为O(252). Loiss is a byte-oriented stream cipher.It generates keystream bytes under control of both initial key and IV.We analyze Loiss’ security in resistance to guess-and-determine attack.Without guessing the register cells of BOMM structure in Loiss,we give an attack method with time complexity O(2247) and data complexity O(252).
出处 《中国科学院研究生院学报》 CAS CSCD 北大核心 2012年第1期125-130,共6页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家自然科学基金(60833008 60902024)资助
关键词 流密码 Loiss BOMM 猜测确定攻击 stream cipher; Loiss; BOMM; guess-and-determine attack
  • 相关文献

参考文献6

  • 1Feng D G, Feng X T, Zhang W T, et al. Loiss: a byte-oriented stream cipher[ J/OL]. IWCC 201.1, LNCS 6639,2011:109-125. [ 2010- 10-05 ]. http:///eprint, iacr. org/2010/489, pdf.
  • 2Canniere C D. Guess and determine attack on SNOW[ C ]//NESSIE Public Document. NES/DOC/KUL/WPS/Oll/a, 2001.
  • 3Hawkes P, Rose G G. Guess and determine attacks on SNOW[ J]. Qualcomm Australia, SAC 2002, LNCS 2595,2003:37-46.
  • 4Mattsson J. A guess-and-determine attack on the stream cipher polar bear[ C ] // SASC'06. 2006 (017) :149-153.
  • 5Ahmadi H, Eghlidos T, Khazaei S. Improved guess and determine attack on SOSEMANUK[ M]. Tehran, Iran, 2006.
  • 6Feng X T, Liu J, Zhou Z C, et al. A byte-based guess and determine attack on SOSEMANUK[ M]. Asiacrypt,2010:146-157.

同被引文献10

  • 1ETSI/SAGE TS 35. 223 - 2011. Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3 ;document 3 :implementors' test data[ S].
  • 2Wu Hongjun, Huang Tao, Nguyen Phuong Ha, et al. Differential attacks against stream cipher ZUC [ C ] // Proceeding of 18th International Conference on the Theo- ry and Application of Cryptology and Information Securi- ty, Beijing: Springer Verlag,2012:262 - 277.
  • 3Zhou Chunfang, Feng Xiutao, Lin Dongdai. The initia- lization stage analysis of ZUC vl. 5 [ C]//Proceeding of the lOth International Conference on Cryptography and Network Security. Sanya:Springer Verlag,2011:40 -53.
  • 4Orhanou G, El Hajji S, Lakbabi A, et al. Analytical evaluation of the stream cipher ZUC [ C ]//Proceedings of 2012 International Conference on Multimedia Compu- ting and Systems. Tangiers: IEEE Computer Society, 2012:927 - 930.
  • 5Feng Xiutao, Liu Jun, Zhou Zhaocun, et al. A byte- based guess and determine attack on SOSEMANUK[ C] //Proceeding of the 16th International Conference on the Theory and Application of Cryptology and Information Se-curity. Singapore : Springer Verlag, 2010 : 146 - 157.
  • 6Nia M S N, Eghlidos T. Improved Heuristic guess and determine attack on SNOW 3G stream cipher[ C ]//Pro- ceeding of the 7th International Symposium on Telecom- munications. Tehran: IEEE Computer Society, 2014: 972 - 976.
  • 7冯秀涛.3GPP LTE国际加密标准ZUC算法[J].信息安全与通信保密,2011,9(12):45-46. 被引量:33
  • 8杜红红,张文英.祖冲之算法的安全分析[J].计算机技术与发展,2012,22(6):151-155. 被引量:9
  • 9关杰,丁林,刘树凯.SNOW3G与ZUC流密码的猜测决定攻击[J].软件学报,2013,24(6):1324-1333. 被引量:16
  • 10马世典,江浩斌,韩牟,陈龙.车联网环境下车载电控系统信息安全综述[J].江苏大学学报(自然科学版),2014,35(6):635-643. 被引量:17

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部