期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Algebraic attacks on two kinds of special nonlinear filter generators
1
作者 杨文峰 Hu Yupu Qiu Hua 《High Technology Letters》 EI CAS 2012年第2期151-154,共4页
This letter proposes algebraic attacks on two kinds of nonlinear filter generators with symmetric Boolean functions as the filter fimctions. Different fxom the classical algebraic attacks, the proposed attacks take th... This letter proposes algebraic attacks on two kinds of nonlinear filter generators with symmetric Boolean functions as the filter fimctions. Different fxom the classical algebraic attacks, the proposed attacks take the advantage of the combinational property of a linear feedback shift register (LFSR) and the symmetric Boolean function to obtain a tow-degree algebraic relation, and hence the complexities of the proposed attacks are independent of the algebraic immunity (AI) of the filter functions. It is shown that improper combining of the LFSR with the filter function can make the filter generator suffer from algebraic attacks. As a result, the bits of the LFSR must be selected properly to input the filter function with large AI in order to withstand the proposed algebraic attacks. 展开更多
关键词 stream cipher linear feedback shift register (LFSR) Boolean function algebraic attack CRYPTANALYSIS
下载PDF
Algebraic Attack on Filter-Combiner Model Keystream Generators
2
作者 WUZhi-ping YEDing-feng MAWei-ju 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期259-262,共4页
Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new cr... Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new criterion for designing Filter-Combiner model was alsoproposed: the total length I. of Linear Finite State Machines used in the model should be largeenough and the degree d of Filter-Combiner function should be approximate [L/2]. 展开更多
关键词 algebraic attack Filter-Combiner model stream cipher 'XL' algorithm function composition
下载PDF
Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers
3
作者 LI Zhengnan WU Baofeng LIN Dongdai 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2023年第6期2681-2702,共22页
Motivated by applications in advanced cryptographic protocols,research on arithmetizationoriented symmetric primitives has been rising in the field of symmetric cryptography in recent years.In this paper,the authors f... Motivated by applications in advanced cryptographic protocols,research on arithmetizationoriented symmetric primitives has been rising in the field of symmetric cryptography in recent years.In this paper,the authors focus on on the collision attacks for a family of arithmetization-oriented symmetric ciphers GMiMCHash.The authors firstly enhance the algebraically controlled differential attacks proposed by introducing more variables.Then,combining algebraic attacks and differential attacks,the authors propose algebraic-differential attacks on GMi MCHash.This attack method is shown to be effective by experiments on toy versions of GMi MCHash.The authors further introduce some tricks to reduce the complexities of algebraic-differential attacks and improve the success probability of finding collisions. 展开更多
关键词 algebraic attacks COLLISIONS differential attacks GMiMCHash Grobner basis
原文传递
A NEW METHOD FOR RESYNCHRONIZATION ATTACK
4
作者 Chen Jie Wang Baocang Hu Yupu 《Journal of Electronics(China)》 2006年第3期423-427,共5页
This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degr... This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(2^17), and that of 0(2^67) for LILI-128. 展开更多
关键词 Stream ciphers Resynchronization attack algebraic attacks Differential cryptanalysis Computational complexity
下载PDF
Boolean functions of an odd number of variables with maximum algebraic immunity 被引量:8
5
作者 LI Na QI WenFeng 《Science in China(Series F)》 2007年第3期307-317,共11页
In this paper, we study Boolean functions of an odd number of variables with maximum algebraic immunity. We identify three classes of such functions, and give some necessary conditions of such functions, which help to... In this paper, we study Boolean functions of an odd number of variables with maximum algebraic immunity. We identify three classes of such functions, and give some necessary conditions of such functions, which help to examine whether a Boolean function of an odd number of variables has the maximum algebraic immunity. Further, some necessary conditions for such functions to have also higher nonlinearity are proposed, and a class of these functions are also obtained. Finally, we present a sufficient and necessary condition for Boolean functions of an odd number of variables to achieve maximum algebraic immunity and to be also 1-resilient. 展开更多
关键词 algebraic attacks algebraic immunity NONLINEARITY correlation immunity
原文传递
On Algebraic Immunity of Trace Inverse Functions on Finite Fields of Characteristic Two 被引量:1
6
作者 FENG Xiutao GONG Guang 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第1期272-288,共17页
The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC... The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx^(-1)).However,currently only some bounds on algebraic immunity of Tr(λx^(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx^(-1)) over F_(2~n),that is,AI(Tr(λx^(-1))) =[2n^(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx^(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx^(-1)) against fast algebraic attacks. 展开更多
关键词 algebraic immunity boolean functions fast algebraic attacks trace inverse functions
原文传递
On the construction of odd-variable boolean functions with optimal algebraic immunity
7
作者 ZHANG Jie WEN Qiao-yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第3期73-77,共5页
Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic immunity are obtained by m-sequence and consequently, we ge... Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic immunity are obtained by m-sequence and consequently, we get bases with special constructions of vector space. Furthermore, through swapping some vectors of these two bases, we establish all kinds of odd-variable balanced Boolean functions with optimal algebraic immunity. 展开更多
关键词 algebraic immunity Boolean functions algebraic attacks ANNIHILATORS
原文传递
On the 2~m-variable symmetric Boolean functions with maximum algebraic immunity 被引量:12
8
作者 QU LongJiang LI Chao 《Science in China(Series F)》 2008年第2期120-127,共8页
The properties of the 2m-variable symmetric Boolean functions with maximum al- gebraic immunity are studied in this paper. Their value vectors, algebraic normal forms, and algebraic degrees and weights are all obtaine... The properties of the 2m-variable symmetric Boolean functions with maximum al- gebraic immunity are studied in this paper. Their value vectors, algebraic normal forms, and algebraic degrees and weights are all obtained. At last, some necessary conditions for a symmetric Boolean function on even number variables to have maximum algebraic immunity are introduced. 展开更多
关键词 algebraic immunity algebraic attack symmetric Boolean function
原文传递
Construction and enumeration of Boolean functions with maximum algebraic immunity 被引量:4
9
作者 ZHANG WenYing WU ChuanKun LIU XiangZhong 《Science in China(Series F)》 2009年第1期32-40,共9页
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This ... Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also n given. For a given function p(x) with deg(p(x)) 〈 [n/2], we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than [n/2]. 展开更多
关键词 CRYPTOGRAPHY algebraic attack algebraic immunity Boolean function
原文传递
Some results on the algebraic immunity of Boolean functions 被引量:1
10
作者 XU Li-qing CHEN hao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第2期102-105,共4页
From the motivation of algebraic attacks on stream and block ciphers,the concept of algebraic immunity(AI) of a Boolean function was introduced and studied extensively.High algebraic immunity is a necessary conditio... From the motivation of algebraic attacks on stream and block ciphers,the concept of algebraic immunity(AI) of a Boolean function was introduced and studied extensively.High algebraic immunity is a necessary condition for resisting algebraic attacks.In this paper,we give some lower bounds on the algebraic immunity of Boolean functions.The results are applied to give lower bounds on the AI of symmetric Boolean functions and rotation symmetric Boolean functions.Some balanced rotation symmetric Boolean functions with their AI near the maximum possible value「n/2」are constructed. 展开更多
关键词 algebraic attack Boolean function AI symmetric Boolean function rotation symmetric Boolean function
原文传递
Construction of Balanced Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity 被引量:1
11
作者 ZHANG Wenying 《Wuhan University Journal of Natural Sciences》 CAS 2014年第4期301-306,共6页
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This ... Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents one main result to find balanced rotation symmetric Boolean functions with maximum algebraic immunity. Through swapping the values of two orbits of rotation class of the majority function, a class of 4k+l variable Boolean functions with maximum algebraic immu- nity is constructed. The function f(x) we construct always has terms of degree n-2 independence of what ever n is. And the nonlinearity off(x) is relatively good for large n. 展开更多
关键词 Boolean function algebraic attack Walsh spectrum algebraic degree algebraic immunity (AI)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部