期刊文献+

针对WSN流密码加密方案的代数攻击及改进

Algebraic Attack and Improvement on WSN Stream Cipher Encryption Scheme
下载PDF
导出
摘要 通过对Yao等人提出的无线传感器网络(WSN)流密码系统(ICMTMA’11)进行分析,找到系统中布尔函数的一个非零低次零化子,再利用代数攻击降低攻击复杂度。为增强WSN流密码加密方案的安全性,采用二阶级联方法构造一个新的布尔函数,其代数免疫度与原函数相比增加1,由此提高抗攻击能力。理论分析结果表明,新方案将原方案的攻击复杂度由255提高至266,可以更好地抵抗代数攻击。 By analyzing Yao's stream cipher scheme of Wireless Sensor Network(WSN), this paper finds a nonzero low times annihilator in the design of Boolean function, and reduces the attack complexity by algebraic attack. In order to enhance the security of WSN stream cipher scheme, this paper constructs a new Boolean function with the second-order concatenation. Compared with original Boolean function, algebra immune degree of the new function increases 1. Analysis results shows that attack complexity of the new scheme promotes the attack complexity from 2^55 to 2^66, proving that the new scheme can resist algebraic attack more effectively.
出处 《计算机工程》 CAS CSCD 2013年第3期142-145,共4页 Computer Engineering
基金 国家自然科学基金资助项目(61063041 61163038 61103199) 甘肃省自然科学基金资助项目(1208RJZA255)
关键词 无线传感器网络 流密码 布尔函数 代数攻击 二阶级联 Wireless Sensor Network(WSN) stream cipher boolean function algebraic attack second-order concatenation
  • 相关文献

参考文献9

  • 1罗启彬,张健.流密码的现状和发展[J].信息与电子工程,2006,4(1):75-80. 被引量:18
  • 2赵凤,王帅,周玉凤,刘楠楠.流密码中布尔函数的研究[J].洛阳师范学院学报,2011,30(5):9-12. 被引量:1
  • 3Tarannikov T. On Resilient Boolean Functions with Maximal Possible[EB/OL]. [2012-04-22]. http://eprint.iacr. org.
  • 4Carlet C, Deepak D K. Algebraic Immunity for Crypto- graphically Significant Boolean Functions: Analysis and Construction[J]. IEEE Transactions on Information Theory, 2002, 52(7): 3105-3121.
  • 5Courtios N, Meier W. Algebraic Attacks on Stream Ciphers with Linear Feedback[M]. [S. 1.]: Springer-Verlag, 2003: 346-359.
  • 6Yao Minglin, Ma Junshuang. Stream Cipher on Wireless Sensor Network[C]//Proceedings of the 3rd International Conference on Measuring Technology and Mechatronics Automation. Shanghai, China: [s. n.], 2001.
  • 7Courtois N, Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt[J]. Lecture Notes in Computer Science, 2002, 2587(11): 182-199.
  • 8董新锋,宋云芬,张文政,谯通旭.具有高代数免疫阶的弹性布尔函数构造[J].计算机工程,2011,37(6):124-126. 被引量:4
  • 9张莉.代数攻击的若干问题研究[D].西安:西安电子科技大学,2006.

二级参考文献40

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部