期刊文献+

一种快速准确适用性广的伪随机扰码识别方法 被引量:4

Fast and Correct Recognition Method for Pseudo-Randomizer Code
下载PDF
导出
摘要 针对高误码率下的伪随机扰码快速盲识别问题,提出了一种结合基于m序列统计特征和基于卷积的快速相关攻击算法的盲识别方法。该方法通过基于m序列统计特性快速获得扰码器生成多项式和通过快速相关攻击准确获得扰码器初态。仿真实验表明,该方法与基于枚举法的扰码识别方法和快速相关攻击的扰码识别方法相比,在识别时间和识别正确率方面都有更好的性能表现。 To solve the recognition of pseudo-randomizer code under the condition of high bit-error rate, a new blind recognition method is proposed. Combining the statistical property of m-sequence and fast correlation attack mechanism based on convolutional codes, this method can fast recognize the generating polynomial based on m-sequence's statistical property and correctly find the initial state of linear feedback shift register(LFSR) through fast correlation attack mechanism. The simulation results show that this method outperforms exiting solutions(e.g., enumeration based solution and fast correlation attack based solution) in terms of recognition time and correct rate.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2015年第4期500-504,共5页 Journal of University of Electronic Science and Technology of China
基金 国家973计划(2013CB329103)
关键词 误码率 盲识别 快速相关攻击 m序列统计特性 伪随机扰码 bit-error rate blind recognition fast correlation attack m-sequence's statistical property pseudo-randomizer code
  • 相关文献

参考文献10

二级参考文献37

  • 1朱华安,谢端强.基于m序列统计特性的序列密码攻击[J].通信技术,2003,36(8):96-98. 被引量:6
  • 2罗向阳,沈利,陆佩忠,刘粉林.高容错伪随机扰码的快速盲恢复[J].信号处理,2004,20(6):552-558. 被引量:13
  • 3杨忠立,刘玉君.自同步扰乱序列的综合算法研究[J].信息技术,2005,29(2):30-32. 被引量:13
  • 4Meier W, Staffelbach O. Fast correlation attacks on certain stream ciphers[J]. J Cryptology, 1989, 1: 159- 176.
  • 5Johansson T, Jonsson F. Improved fast correlation attacks on stream ciphers via convolutional codes[ C] //Advances in Cryptology-EUROCRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999, 1592: 347-362.
  • 6Johansson T, Jonsson F. Fast correlation attacks based on turbo code techniques[C] //Advances in Cryptology-CRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999,1666:181 - 197.
  • 7Johansson T, Jonsson F. Theoretical analysis of a correlation attack based on convolutional codes [ J ]. IEEE Trans On Information Theory, 2002, 48(8) : 2173- 2181.
  • 8Colic D J, Hawkes P. Vectorial approach to fast correlation attacks[J]. Designs, Codes and Cryptpgraphy, 2005, 35: 5-19.
  • 9Golic D J. Computation of low-weight parity-check polynomials [J]. Electronic Leters, 1996, 32: 1981- 1982.
  • 10Meier W, Staffelbach O. Fast Correlation Attacks on Certain Stream Ciphers[J]. J. Cryptology, 1989, 1(3): 159-176.

共引文献55

同被引文献33

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部