期刊文献+

SNOW 3G加密算法的BDD攻击 被引量:1

BDD attack on SNOW 3G encryption algorithm
下载PDF
导出
摘要 为了对SNOW 3G加密算法进行安全性分析,提出一种改进的BDD攻击。依据线性反馈移位寄存器的反馈多项式选择特定内部比特流构造第一类OBDD。利用猜测决定攻击的思想,猜测若干有限状态机的内部状态,并寻找其与SNOW 3G加密算法输出的密钥流之间的联系来推测密码器内部比特流,以此构造第二类OBDD。将2类OBDD进行交集操作得到SNOW 3G加密算法的初始密钥。分析结果表明,改进的BDD攻击优于原BDD攻击,对SNOW 3G加密算法的安全性更具威胁。 In order to analyze the security of SNOW 3Gencryption algorithm,an improved BDD attack method is proposed.The feedback polynomial of the linear feedback shift register is used to choose specific internal bit stream,which can construct the first kind of OBDD.Using the idea of guess and determine attack to guess internal state of finite state machine and find the connection between internal state and the keystream of SNOW 3Gencryption algorithm for surmising the internal bit stream of cipher,which can construct the second kind of OBDD.The initial key of SNOW 3Gencryption algorithm is obtained by the intersection operation of two kinds of OBDD.The analysis results show that the improved algorithm is better than original BDD attack and more threatening to SNOW 3Gencryption algorithm.
出处 《桂林电子科技大学学报》 2016年第3期199-203,共5页 Journal of Guilin University of Electronic Technology
基金 国家自然科学基金(61262030 61572146 61363030) 广西自然科学基金(2015GXNSFAA139285 2014GXNSFAA118354)
关键词 密码分析 BDD攻击 SNOW 3G加密算法 猜测决定攻击 cryptanalysis BDD attack SNOW 3Gencryption algorithm guess and determine attack
  • 相关文献

参考文献9

  • 1NYBERG K,WALLéN J.Improved linear distinguishers for SNOW 2.0[C]//Fast Software Encryption.Berlin:Springer Berlin Heidelberg,2006:144-162.
  • 2BIRYUKOV A,PRIEMUTH-SCHMID D,ZHANG B.Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G⊕[C]//Applied Cryptography and Network Security.Berlin:Springer Berlin Heidelberg,2010:139-153.
  • 3关杰,丁林,刘树凯.SNOW3G与ZUC流密码的猜测决定攻击[J].软件学报,2013,24(6):1324-1333. 被引量:16
  • 4KRAUSE M.BDD-based cryptanalysis of keystream generators[C]//Advances in Cryptology:EUROCRYPT2002.Berlin:Springer Berlin Heidelberg,2002:222-237.
  • 5ETSI/SAGE. Specification of the 3GPP confidentiality and integrity algorithms UEA2&UIA2[OL]. (2006-12- 18) [2016 -3-18]. http://cryptome, org/uea2-uia2/uea2- uia2. htm.
  • 6STEGEMANN D.BDD-based cryptanalysis of the A5/1keystream generator-experimental results[C]//The State of the Art of Stream Ciphers,2004:1-6.
  • 7SHAKED Y,WOOL A.Cryptanalysis of the bluetooth E0cipher using OBDD’s[C]//Information Security.Berlin:Springer Berlin Heidelberg,2006:187-202.
  • 8D-ORD-EVIC'S,BOJANI C'S,NIETO-TALADRIZ O.BDD-based cryptanalysis of LFSR stream ciphers[C]//Proceedings of Small Systems Simulation Symposium,2010:13-16.
  • 9GHASEMZADEH M,MEINEL C,SHIRMOHAMMADI M,et al.ZDD-based cryptanalysis of E0keystream generator[C]//Proceedings of 3th International Conference on Mathematical Sciences,2008:1-6.

二级参考文献1

共引文献15

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部