期刊文献+

对流密码SNOW2.0的快速相关攻击研究

Research on Convection Passwords SNOW2.0 Fast Correlation Attack
下载PDF
导出
摘要 随着信息社会的发展与进步,信息安全问题越来越受到人们的关注。如何确保信息安全,实现信息的保密性,成为了科学研究的一个重点。为实现信息安全,很多方面都会应用到密码,对信息采取防护措施,从而达到保证信息安全性与保密性的目的。本文主要对序列密码的基本概念及密码设计方法进行了简述,着重在对流密码SNOW2.0算法实现与发展分析,并对SNOW2.0算法的GD攻击、线性区分攻击以及代数攻击进行了阐述,希望能够为信息安全领域提供一定的参考价值。 With the development and progress of information society, the problem of information security more and more get the attention of people. How to ensure information security, to achieve the confidentiality of information, has become one of the focuses of research. To realize information security, many ways can be applied to the password, take protective measures to the information, so as to achieve the goal of guarantee the information security and confidentiality. This article mainly discusses the basic concepts of sequence code and password design method on the brief,, focused on analysis of convection password SNOW2.0 algorithm implementation and development, and a lot of GD attack SNOW2.0 algorithm, linear to distinguish between attack and algebraic attack, hoping to provide certain reference value in information security field.
作者 申宇
出处 《信息安全与技术》 2013年第11期41-43,共3页
关键词 对流密码 相关攻击 安全 convection passwords the related attack security
  • 相关文献

参考文献5

二级参考文献66

  • 1雷彦云,林嘉宇.基于流密码的数据加解密系统设计[J].科技信息,2008(27). 被引量:1
  • 2罗启彬,张健.流密码的现状和发展[J].信息与电子工程,2006,4(1):75-80. 被引量:18
  • 3丘水生,陈艳峰,吴敏,马在光,龙敏,刘雄英.一种新的混沌加密系统方案原理[J].电路与系统学报,2006,11(1):98-103. 被引量:23
  • 4李昌刚,张昕,朱芳来,应艳杰,汪永斌.一种新的密钥流发生器设计算法[J].计算机工程,2007,33(10):138-140. 被引量:3
  • 5SIEGENTHALER T. Decrypting a class of stream ciphers using ciphertext only[J]. IEEE Trans Comput, 1985, C-34(1): 81-85.
  • 6MEIER W, STAFFELBACH O. Fast correlation attacks on certain stream ciphers[J]. Journal of Cryptology, 1989, 1(3): 159-176.
  • 7MEIER W, STAFFELBACH O, Fast correlation attacks on certain stream ciphers[M/CD]. [2009-05-22]. http://portal. acm.org/citation.cfm?id=55582.
  • 8CHEPYZHOV V, SMEETS B. On a fast correlation attack on certain stream ciphers[M/CD]. [2009-05-22]. http://portal. acm.org/.
  • 9MIHALJEVIC M J, Jovan D J G, A comparison of cryptanalytic principles based on iterative error correction[M/CD]. [2009-05-12]. http://portal.acm.org/.
  • 10MIHALJEVIC M J, GOLIC J Dj. Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence[M/CD]. [2009-05-22]. http://portal.acm. org/.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部