期刊文献+

流密码Grain-128密钥恢复攻击及改进 被引量:1

KEY RECOVERY ATTACK ON STREAM CIPHER GRAIN-128 AND ITS IMPROVEMENT
下载PDF
导出
摘要 流密码Grain-128是Grain v1算法的密钥增长版本。为探讨流密码Grain-128的安全性,指出Grain-128密钥流生成器的3个布尔函数的设计缺陷,在此基础上给出流密码Grain-128一种基于密钥流生成器中间内部状态的密钥恢复攻击。该攻击的计算复杂度和空间复杂度都为O(256)。为了抵抗该攻击,对Grain-128密钥流生成器的设计进行了改进。安全性分析表明,改进后的流密码Grain-128能够抵抗所提出的密钥恢复攻击。 Stream cipher Grain-128 is the key-growth version of Grain v1 algorithm. In order to probe the security of stream cipher Grain-128,we pointed out three design weaknesses of Boolean function in regard to Grain-128 key-stream generator. Based on that,we presented a key recovery attack on the stream cipher Grain-128,which is based on the internal state in key-stream generator. The computational complexity and spatial complexity of attack are all O( 254). In order to resist the key recovery attack,we improved the design of Grain-128key-stream generator. Security analysis showed that the improved stream cipher Grain-128 I was able to resist the proposed key recovery attacks.
出处 《计算机应用与软件》 CSCD 2016年第5期298-301,共4页 Computer Applications and Software
基金 国家自然科学基金项目(61370188) 北京市支持中央高校共建项目-青年英才计划 中央高校基本科研业务费专项资金资助课题(2014CLJH09)
关键词 流密码Grain-128 密钥恢复攻击 密钥流生成器 布尔函数 Stream cipher Grain-128 Key recovery attack Key-stream generator Boolean function
  • 相关文献

参考文献11

  • 1e STREAM-ECRYPT stream cipher project[EB/OL].http://www.ecrypt.eu.org/stream/.
  • 2杨昌盛,于敬超,严迎建.Grain-128同步流密码的选择初始向量相关性能量攻击[J].计算机应用,2014,34(5):1318-1321. 被引量:3
  • 3Hell M,Johansson T,Maximov A.A Stream Cipher Proposal:Grain-128[C]//Information Theory,2006 IEEE International Symposium on,IEEE,2006:1614-1618.
  • 4Miodrag J M,Sugata G,Goutam P,et al.Generic Cryptographic Weakness of K-normal Boolean Founctions in Certain Stream Ciphers and Cryptanalysis of Grain-128[J].Periodica Mathematica Hungarica,2012,65(2):205-207.
  • 5Dinur I,Shamir A.Breaking Grain-128 with Dynamic Cube Attacks[C]//Proc.16th Conf.Theory and Applicat of Cryptology and Inform Sec Urity(ASLACRYPT 2010),Singapore,2010:130-146.
  • 6宋海欣,范修斌,武传坤,冯登国.流密码算法Grain的立方攻击[J].软件学报,2012,23(1):171-176. 被引量:12
  • 7Lee Y,Jeong K,Sung J,et al.Related-Key Chosen IV Attacks on Grain-v1 and Grain-128[M]//Information Security and Privacy,Springer Berlin Heidalberg,2008:321-335.
  • 8Nicolas T,Courtois Willi Meier.Algebraic Attacks on Stream Ci-phers with Linear Feedback[C]//Proc of the International Conference on the Theory and Applications of Cryptographic Techniques B-erlin Spring,2003:345-359.
  • 9Biham E,Shamir A.Differential Cryptanalysis of DES-like Cryptosystems[J].Journal of Cryptology,1991,4(1):3-72.
  • 10Alex Biryukov,Adi Shamir.Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers[C]//Proc of the 6th International Conference on Theory and Application of Cryptology and Security,Berlin Springer,2000:1-15.

二级参考文献31

  • 1MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
  • 2eSTREAM-ECRYPT stream cipher project, http://www.ecrypt.eu.org/stream/.
  • 3Hell M, Johansson T. Breaking the F-FCSR-H stream cipher in real time. In: Pieprzyk J, ed. Proc. of the ASIACRYPT 2008. LNCS 5350, Heidelberg: Springer-Verlag, 2008. 557-569. [doi: 10.1007/978-3-540-89255-7_34].
  • 4Hell M, Johansson T, Meier W. Grain--A stream cipher for constrained environments, eSTREAM-ECRYPT Stream Cipher Project Report, 2005/010, 2005. http://www.ecrypt.eu.org/stream/ciphers/grain/grain.pdf [doi: 10.1504/IJWMC.2007.013798].
  • 5Berbain C, Gilbert H, Maximov A. Cryptanalysis of Grain. In: Robshaw MJB, ed. Proc. of the FSE 2006. LNCS 4047, Heidelberg: Springer-Verlag, 2006. 15-29. [doi: 10.1007/11799313_2].
  • 6Khazaei S, Hassanzadeh M, Kiaei M. Distinguishing attack on Grain. eSTREAM-ECRYPT Stream Cipher Project Report, 2005/071, 2005. http://www.ecrypt.eu.org/stream/papersdir/071.pdf.
  • 7Kucuk O. Slide resynchronization attack on the initialization of Grain 1.0. eSTREAM-ECRYPT Stream Cipher Project Report, 2006/044, 2006. http://www.ecrypt.eu.org/stream/papersdir/2006/044.ps.
  • 8Hell M, Johansson T, Maximov A, Meier W. The Grain family of stream ciphers. In: Robshaw M, Billet O, eds. Proc. of the New Stream Cipher Designs. LNCS 4986, Heidelberg: Springer-Verlag, 2008. 179-190. [doi: 10.1007/978-3-540-68351-3_14].
  • 9Hell M, Johansson T, Meier W. A stream cipher proposal: Grain-128. eSTREAM-ECRYPT Stream Cipher Project. 2006. http://www.ecrypt.eu.org/strearn/grainp3.html [doi: 10.1109/ISIT.2006.261549].
  • 10De Canniere C, Kucuk O, Preneel B. Analysis of Grain's initialization algorithm. In: Vaudenay S, ed. Proc. of the AFRICACRYPT 2008. LNCS 5023, Heidelberg: Springer-Verlag, 2008.276-289.

共引文献13

同被引文献15

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部