基于分类搜索与快速变换的流密码攻击算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Stream Cipher Attack Algorithm Based on Classified Search and Fast Transformation
  • 作者:陆正福 ; 杨慧慧 ; 周宪法
  • 英文作者:LU Zhengfu;YANG Huihui;ZHOU Xianfa;School of Mathematics and Statistics,Yunnan University;
  • 关键词:线性反馈移位寄存器 ; 最大似然译码 ; 快速相关攻击 ; 映射结构
  • 英文关键词:linear feedback shift register;;maximum likelihood decoding;;fast correlation attack;;mapping structure
  • 中文刊名:SYSY
  • 英文刊名:Research and Exploration in Laboratory
  • 机构:云南大学数学与统计学院;
  • 出版日期:2019-04-15
  • 出版单位:实验室研究与探索
  • 年:2019
  • 期:v.38;No.278
  • 基金:国家自然科学基金项目(10861012);; 云南省教育厅科学研究基金项目(09Y0347);; 云南大学理(工)科校级科研基金项目(YNUY201368);云南大学中青年骨干教师培养计划专项经费基金项目(XT412003)
  • 语种:中文;
  • 页:SYSY201904023
  • 页数:5
  • CN:04
  • ISSN:31-1707/T
  • 分类号:98-101+122
摘要
提出了基于分类搜索、快速变换和最大似然译码(MLD)的快速相关攻击算法FCA-MLD-CS-FWT。在寻找校验方程时首次引入分类搜索策略;对校验方程引用快速Walsh变换;在译码阶段对线性反馈移位寄存器(LFSR)的状态分割,并采用MLD进行LFSR初态的破译。实验表明:该算法可在单核计算平台上将原始密钥长度为60的流密码破译时间缩短在1 h左右;通过静态字典的建立可实现不同参数校验方程的快速搜索;译码阶段时间复杂度由O(2~Bm)降低为O(2~BB+m)。
        A fast correlation attack algorithm FCA-MLD-CS-FWT based on classification search,fast transformation and maximum likelihood decoding( MLD) is constructed. The classification search strategy is introduced for the first time in finding the checkout equation,and the fast Walsh transform is used for the check equation. In the decoding stage,the state of LFSR is segmented and MLD is used to decipher the initial state of LFSR. The experimental shows that FCAMLD-CS-FWT can shorten the decoding time of the stream cipher with the original key length of 60 on the single core computing platform for about 1 hours. Through the establishment of the static dictionary,the fast search for the calibration equation of different parameters can be realized; the time complexity of the decoding phase is reduced from O( 2~Bm) to O( 2~BB + m).
引文
[1] Upadhya D,Gandhi S. Randomness Evaluation of ZUC,SNOW and GRAIN Stream Ciphers[C]//Proceedings of International Conference on Communication and Networks. NY:IEEE,2017.
    [2] Zhang B,Xu C,Meier W. Fast Correlation Attacks over Extension Fields,Large-Unit Linear Approximation and Cryptanalysis of SNOW2. 0[C]//Advances in Cryptology——CRYPTO 2015.[s. l.]:Springer Berlin Heidelberg,2015:643-662.
    [3] Kim H R,Lee H J,Moon S J. A Security Enhancement of the E0Cipher in Bluetooth System[C]//Kes International Conference on Agent and Multi-Agent Systems:Technologies and Applications.[s.l.]:Springer-Verlag,2008:858-867.
    [4] Zhang H N,Li L,Wang X Y. Fast correlation attack on stream cipher ABC v3[J]. Science China Information Sciences,2008,51(7):936-947.
    [5] Ma Z,Qi W F,Tian T. On affine sub-families of the NFSR in Grain[J]. Designs Codes&Cryptography,2015,75(2):199-212.
    [6] Yun J,Park K W,Shin Y,et al. An Efficient Stream Cipher for Resistive RAM[J]. IEICE Electronics Express,2017,14(7):1-6.
    [7] Chakraborty A,Mukhopadhyay D. A Practical Template Attack on MICKEY-128 2. 0 Using PSO Generated IVs and LS-SVM[C]//International Conference on Vlsi Design and 2016, International Conference on Embedded Systems.[s. l.]:IEEE,2016:529-534.
    [8] Hell M,Johansson T. Breaking the stream ciphers F-FCSR-H and FFCSR-16 in real time[J]. Journal of Cryptology,2011,24(3):427-445.
    [9] Johansson T. Correlation attacks on stream ciphers and related decoding problems[M]. 1998.
    [10] Agren M,Londahl C,Hell M,et al. A survey on fast correlation attacks[J]. Cryptography&Communications,2012,4(3-4):173-202.
    [11] Chepyzhov V V,Johansson T,Smeets B. A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers[C]//International Workshop on Fast Software Encryption. Berlin:Springer,Heidelberg,2000:181-195.
    [12] Molland H,Mathiassen J E,Helleseth T. Improved Fast Correlation Attack Using Low Rate Codes[C]//Cryptography and Coding,Ima International Conference,Cirencester. UK:Proceedings DBLP,2003:67-81.
    [13]伍文君,唐贵林,黄芝平.一种快速相关攻击算法[J].计算机工程,2009,35(17):129-13.
    [24]刘好莉,任义,杨晗.一种改进的CJS型快速相关攻击算法[J].电子技术与软件工程,2017(21):141.
    [15] 2017年全国高校密码数学挑战赛之赛题二[EB/OL].(2017)[2018-5-25]. http://www. cmsecc. org/xiazai/.
    [16]陈运.信息论与编码[M].北京:电子工业出版社,2016.
    [17]田宝玉,杨洁,贺志强,等.信息论基础[M].北京:人民邮电出版社,2016.
    [18] Noorkami M,Fekri F. A Fast Correlation Attack via Unequal Error Correcting LDPC Codes[J]. Lecture Notes in Computer Science,2004,2964:54-66.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700