期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Improved distinguisher for Achterbahn-128 stream cipher
1
作者 Li Shunbo Huang Guangqiu +2 位作者 Wang Yan Hui Feifei Peng Jialong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第2期23-27,共5页
Achterbahn-128 is a stream cipher proposed by Gammel et al. and submitted to the eSTREAM project. Though many attacks have been published, no recovery attack better than Naya-Plasencia' s results with 256 bit keystre... Achterbahn-128 is a stream cipher proposed by Gammel et al. and submitted to the eSTREAM project. Though many attacks have been published, no recovery attack better than Naya-Plasencia' s results with 256 bit keystream limitation. Similar approach is shown and found a specific parity check and decimation. Then an improved distinguisher is constructed for Achterbahn-128 to recover the key with only O (255) keystream bit and O (2102) time complexity. Furthermore, this result is much more effective than the former. 展开更多
关键词 CRYPTANALYSIS stream cipher distinguishing attack Achterbahn parity check
原文传递
RISE: A RelIable and SEcure Scheme for Wireless Machine to Machine Communications 被引量:1
2
作者 Wei Ren Linchen Yu +1 位作者 Liangli Ma Yi Ren 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期100-107,共8页
Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A ... Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M's failure. This paper presents a Reliable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme, 展开更多
关键词 Machine to Machine (M2M) reliability security target distinguishing attack
原文传递
Cryptanalysis of Achterbahn-Version 1 and-Version 2
3
作者 黄小莉 武传坤 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第3期469-475,共7页
Achterbahn is one of the candidate stream ciphers submitted to the eSTREAM, which is the ECRYPT Stream Cipher Project. The cipher Achterbahn uses a new structure which is based on several nonlinear feedback shift regi... Achterbahn is one of the candidate stream ciphers submitted to the eSTREAM, which is the ECRYPT Stream Cipher Project. The cipher Achterbahn uses a new structure which is based on several nonlinear feedback shift registers (NLFSR) and a nonlinear combining output Boolean function. This paper proposes distinguishing attacks on Achterbahn-Version 1 and -Version 2 on the reduced mode and the full mode. These distinguishing attacks are based on linear approximations of the output functions. On the basis of these linear approximations and the periods of the registers, parity checks with noticeable biases are found. Then distinguishing attacks can be achieved through these biased parity checks. As to Achterbahn-Version 1, three cases that the output function has three possibilities are analyzed. Achterbahn-Version 2, the modification version of Achterbahn-Version 1, is designed to avert attacks based on approximations of the output Boolean function. Our attack with even much lower complexities on Achterbahn-Version 2 shows that Achterbahn-Version 2 cannot prevent attacks based on linear approximations. 展开更多
关键词 CRYPTOLOGY CRYPTANALYSIS distinguishing attack stream cipher Achterbahn eSTREAM
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部