期刊文献+

向量k-正规函数滤波模型流密码猜测确定攻击

Research on guess and determine attack on stream cipher with k-normality class filter generator
下载PDF
导出
摘要 猜测确定攻击是非线性滤波生成器的有效分析方法。滤波函数的代数性质是直接关系该模型抵抗猜测确定攻击能力的关键因素之一。正规性是密码函数的一个重要指标。文中分析了当滤波函数为k-(弱)正规函数时,使得滤波器猜测确定攻击采样次数明显减少,在攻击所需要的预计算复杂度和存储复杂度不变的情况下,降低攻击复杂度了2n-m-k。 Guess and determine attack is a very practical method among cryptanalysis methods for streamciphers. Algebraic properties of the filter function is directly related to the model of resistance to one ofthe key factors whatis an important criterion in designing cryptographic functions. Thispaperanalyzesthatwhen the filter functions belongs to k- (weak) normality function, the filter state guessing attack and itsapplication to filter generators with filter is significantly reduced. In some cases, this approach reducesattack complexity compared to 2n-m-k.
作者 李枫 张文政 王金波 陈宇翔 LI Feng;ZHANG Wen-zheng;WANG Jin-bo;CHEN Yu-xiang(No.30 Institute of CETC,Chengdu 610000,China)
出处 《信息技术》 2018年第12期34-37,共4页 Information Technology
基金 国家重点研发计划资助(2017YFB0802000) 国家自然科学基金(61502441)
关键词 序列密码 猜测确定攻击 滤波函数 正规性 stream cipher guess and determine attack filter function normality
  • 相关文献

参考文献1

二级参考文献11

  • 1Dobbertin H.Constructions of bent functions and balanced Boolean functions with high nonlinearity[C]//Fast Software Encryption,Lecture Notes in Computer Science.Springer-Verlag,1994,1008:61-74.
  • 2Carlet C.On the complexity of cryptographic Boolean functions[C]//Sixth International Conference on Finite Fields and Applications,Lecture Notes in Computer Science.Berlin:Springer,2002:53-69.
  • 3Zhang X M,Josef P,Zheng Y.On Algebraic Immunity and An-nihilators[C]//ICISC 2006,LNCS 4296.Berlin Heidelberg.Springer-Verlag,2006:65-80.
  • 4Daum M,Dobbertin H,Leander G.An algorithm for checking normality of Boolean functions[C]//Proceedings of the 2003 International Workshop on Coding and Cryptography (WCC 2003).Versailles,France,2003:133-142.
  • 5Braeken A,Wolf C,Preneel B.A randomised algorithm for checking the normality of cryptographic Boolean functions[C]//IF-IP TCS.Kluwer,2004:51-66.
  • 6Courtois N,Meier W.Algebraic attacks on stream cipher with linear feedback[C]//Advances in Cryptology-EUROCRYPT 2003,LNCS 2656.Springer Verlag,2003:345-359.
  • 7Meier W,Pasalic E,Carlet C.Algebraic attacks and decomposition of Boolean functions[C]//Advances in Cryptology-EU-ROCRYPT 2004,LNCS 3027.Springer-Verlag,2004:474-491.
  • 8Dalai D K,Gupta K C,Maitra S.Results on Algebraic immunity for cryptographically significant Boolean functions[C]//INDO-CRYPT 2004,LNCS 3348.Springer-Verlag,2004:92-106.
  • 9Dubuc S.Etude des proprie tes de degenerescence et de normali-te des fonctions booleennes et construction de fonctions q-aires parfaitement non-line aires[D].Universite de Caen,2001.
  • 10Zheng Y,Zhang X M,Imai H.Restriction,terms and nonlinearity of Boolean functions[J].Theoretical Computer Science,1999,226(1),207-223.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部