期刊文献+

一类低频重零化子的推导及频谱分析 被引量:1

Derivation and spectrum analysis of a kind of low weight spectral annihilator
下载PDF
导出
摘要 针对序列密码实现有效的离散傅里叶频谱攻击,前提条件是寻找到序列的低频重乘积关系或低频重零化子。利用周期序列的离散傅里叶变换,得到满足乘积关系序列的一个充要条件,并以此为基础,定义频谱循环差分,推导出一类低频重乘积关系和低频重零化子。同时研究了m序列的频谱性质,给出了m序列的频谱空间快速计算方法以及计算实例。 For stream cipher to implement effective fast discrete Fourier spectra attack, it is necessary to find a low spectral weight relation or a low spectral weight annihilator. By using discrete Fourier transform of periodic sequences, a necessary and sufficient condition of the sequences which meet product relation was achieved. And on this basis, by defining spectral cycle difference, a kind of low spectral weight relation and annihilator was derived. At the same time, the spectral properties of m sequences was researched, a method to calculate the spectral space quickly was proposed and an example was given.
出处 《计算机应用》 CSCD 北大核心 2015年第12期3447-3449,3455,共4页 journal of Computer Applications
基金 2014年保密通信重点实验室基金资助项目(9140C110203140C11049)
关键词 低频重 乘积关系 零化子 频谱循环差分 频谱空间 low spectral weight product relation annihilator spectral cycle difference spectral space
  • 相关文献

参考文献7

  • 1COURTOIS N T, MEIER W. Algebraic attacks on stream ciphers with linear feedback [ C]// Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Tech- niques: Advances in Cryptology -- EUROCRYPT 2003, LNCS 2656. Berlin: Springer, 2003:345-359.
  • 2RONJOM S, HELLESETH T. A new attack on the filter generator[ J]. IEEE Transactions on Information Theory, 2007, 53(5) : 1752 - 1758.
  • 3GONG G, RONJOM S, HELLESETH T, et al. Fast discrete Fourier spectra attacks on stream ciphers [ J]. IEEE Transactions on Infor- mation Theory, 2011,57(8) : 5555 - 5565.
  • 4王晶晶,陈克非.序列快速傅里叶攻击的改进[J].上海交通大学学报,2012,46(2):285-288. 被引量:3
  • 5RONJOM S, GONG G, HELLESETH T. On attacks on filtering gen- erators using linear subspace structures [ C]//SSC 2007: Proceedings of the 2007 International Workshop on Sequences, Subsequenees, and Consequences, LNCS 4893. Berlin: Springer, 2007:204-217. WANG J, CHEN K, ZHU S. Annihilators of fast discrete Fourier spectra attacks [ C]//IWSEC 2012: Proceedings of the 7th Interna- tional Workshop on Security: Advances in Information and Computer Security, LNCS 7631. Berlin: Springer, 2012: 182-196. RONJOM S, HELLESETH T. Attacking the filter generator over GF(2') [ C]// WAIFI 2007: Proceedings of the 1st International Workshop on Arithmetic of Finite Fields, LNCS 4547. Bedim Springer, 2007:264 - 275.
  • 6WANG J, CHEN K, ZHU S. Annihilators of fast discrete Fourier spectra attacks [ C]//IWSEC 2012: Proceedings of the 7th Interna- tional Workshop on Security: Advances in Information and Computer Security, LNCS 7631. Berlin: Springer, 2012: 182-196.
  • 7RONJOM S, HELLESETH T. Attacking the filter generator over GF(2') [ C]// WAIFI 2007: Proceedings of the 1st International.

二级参考文献5

  • 1Armknecht F.Algebraic attacks on certain stream ci-phers[D].Germany:School of Business Informaticsand Mathematics,University Mannheim,2006.
  • 2Armknecht F,Krause M.Algebraic attacks on com-biners with memory[C] //Boneh D.CRYPTO 2003.Germany:Springer Berlin,2003:162-175.
  • 3Gong G,Ronjom S,Helleseth T,et al.Fast discretefourier spectra attacks on stream ciphers[J].IEEETransactions on Information Theory,2011,57(8):5555-5565.
  • 4Golomb S W,Gong G.Signal design for good corre-lation for wireless communication,cryptography,andradar[M].New York:Cambridge UniversityPress,2005.
  • 5Bluetooth Special Interest Group.Specification of thebluetooth system,Version 1.1[EB/OL].(2000-03-15)[2011-10-22].http://www.bluetooth.com/.

共引文献2

同被引文献11

  • 1GONG G, Rcnjom S, Helleseth T. Fast Discrete Fourier Spectra Attacks on Stream Ciphers [ J ]. IEEE Transac- tions on Information Theory. 2011, 57: 5555-5565.
  • 2王品晶.序列密码的快速离散傅里叶频谱攻击[D].上海交通大学硕士论文,2013:13-34.
  • 3Courtois N. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback [ C ]. Advances in Cryptology - CRYPT() 2003. Springer-Verlag. 2003,2729 : 176-194.
  • 4Armknecht F. Improving Fast Algebraic Attacks [ C ~. FSE 2004. Springer-Verlag. 2004, 3017: 65-82.
  • 5Courtois N, Meier W. Algebraic Attacks on Streanl Ciphers with Linear Feedback [ C 1- Advances in Cryptology - Euro- crypt' 2003. Springer-Verlag. 2003,2656:345-359.
  • 6Armkneeht F, Krause M. Algebraic Attacks on Combin- ers with Memory [ C 1. Advances in Cryptology - CRYP- TO 2003. Springer-Verlag. 2003,2729.:162-176.
  • 7Helleseth T, Rcnjom S. Simplifying Algebraic Attacks with Univariate Analysis [ C ]. Information Theory and Applications Workshop (ITA) , 2011. [ S. 1. ] : IEEE, 2011 : 1-7.
  • 8WANG Jing-jing, CHEN Ke-fei, ZHU Shi-xiong. An- nihilators of Fast Discrete Fourier Spectra Attacks [ C ]. Advances in Information and Computer Security. Heidel- berg : Springer, 2012 : 182-196.
  • 9Ronjom S, Gong G, Helleseth T. On Attacks on Filte- ring Generators Using l,inear Subspaee Structures [ C ~. Sequences, Subsequences, and Consequences. Berlin Heidelberg: Springer, 2007, 4893: 204-217. ~,.
  • 10王晶晶,陈克非.序列快速傅里叶攻击的改进[J].上海交通大学学报,2012,46(2):285-288. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部