期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An Improved Framework of Massive Superpoly Recovery in Cube Attacks Against NFSR-Based Stream Ciphers
1
作者 LIU Chen TIAN Tian QI Wen-Feng 《密码学报(中英文)》 CSCD 北大核心 2024年第5期1179-1198,共20页
A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently... A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers. 展开更多
关键词 NFSR-based stream ciphers cube attacks MILP Trivium
下载PDF
一种基于OODA的网络安全防御体系模型
2
作者 杨晨立 常朝稳 《网络安全技术与应用》 2024年第9期3-6,共4页
随着信息技术的发展,网络覆盖到了社会的每个角落,但是网络安全威胁也随之而来。目前,传统的网络防御方法不能适应快速进化的网络安全威胁,亟需一种灵活、动态且具有高效性的防御体系。本文提出了一种基于OODA(观察、定向、决策、行动)... 随着信息技术的发展,网络覆盖到了社会的每个角落,但是网络安全威胁也随之而来。目前,传统的网络防御方法不能适应快速进化的网络安全威胁,亟需一种灵活、动态且具有高效性的防御体系。本文提出了一种基于OODA(观察、定向、决策、行动)循环的网络安全防御体系模型,意在帮助用户快速感知威胁、分析威胁、做出决策并采取相应行动,从而有效应对网络安全威胁。 展开更多
关键词 OODA 网络安全 博弈论
原文传递
拒止环境下无人机集群网络安全及密钥管理框架
3
作者 冯志尚 袁霖 刘军 《网络安全技术与应用》 2023年第10期28-31,共4页
具有“自主、协同”功能的无人机集群作战是未来多域作战和联合作战的重要样式。拒止环境下,无人机集群将面临强电磁干扰、强电磁对抗和防空火力密集等问题。本文基于无人机集群的典型网络结构,分析了无人机集群作战的网络特性,给出了... 具有“自主、协同”功能的无人机集群作战是未来多域作战和联合作战的重要样式。拒止环境下,无人机集群将面临强电磁干扰、强电磁对抗和防空火力密集等问题。本文基于无人机集群的典型网络结构,分析了无人机集群作战的网络特性,给出了拒止环境下无人机集群网络可能面临的主要安全威胁,设计了一种无人机集群在拒止环境下的密钥管理框架,为解决拒止环境下的无人机集群网络安全通信问题奠定基础。 展开更多
关键词 拒止作战环境 无人机集群 网络安全 密钥管理框架
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部