期刊文献+

对序列密码统计测试的新方法

New Methods for Statistical Analysis of Stream Ciphers
原文传递
导出
摘要 对密钥流的统计分析是序列密码算法设计与分析中的重要内容。文中从随机布尔函数和随机向量值函数的Walsh谱的分布特性出发,对同步序列密码提出了两种新的选择IV统计分析方法。并利用这些新方法对入选eSTREAM计划的Grainv0、Grainv1和Trivium算法进行了统计测试。结果表明,Grainv0和Grainv1的伪随机性没有达到最好。 Statistical analysis of the key-stream is an important part in the design and analysis of stream ciphers. This paper proposes two new methods for chosen-IV statistical analysis of synchronous stream ciphers based on the distribution of Walsh Transform of random Boolean functions and random vectorial Boolean functions. These methods are used to analyze Grain v0, Grain v1 and Trivium, which are selected into the eSTREAM project. The results show that the pseudo-randomness of Grain v0 and Grain vl couldn't reach the ideal case.
出处 《信息安全与通信保密》 2012年第10期78-80,83,共4页 Information Security and Communications Privacy
关键词 随机性测试 WALSH谱 同步序列密码 Grain算法 Trivium算法 randomness test Walsh transform synchronous stream cipher Grain Trivium
  • 相关文献

参考文献16

  • 1刘依依.eSTREAM和流密码分析现状[J].信息安全与通信保密,2009,31(12):47-49. 被引量:13
  • 2陈一阳,陈恭亮.流密码典型分析方法及实例[J].信息安全与通信保密,2010,7(6):87-89. 被引量:3
  • 3何元禹.流密码中的单圈T-函数[J].通信技术,2010,43(3):165-167. 被引量:1
  • 4KNUH D E. Seminumerical Algorithms[M]. The Art of ComputerProgramming(Volume 2)Massachusetts : Addison, 1981.
  • 5MARSAGLIA G. DIEHARD Statistical Tests[EB/OL]. [2012-02-16]. http: //stat.fsu.edu/geo/diehard.html.
  • 6Information Security Institute. Crypt-X[EB/OL]. [2012-02-16]. http: //www.isi.qut.edu.au/resources/cryptx/.
  • 7RUKIN A, SOTO J, NECHVATAL J, et al. A Statistical Test Suit for Random and Pseudorandom Number Generators for Cryptographic Applications(NIST Special Publication(800-22) [EB/OL]. [2012-02-16]. http: //www.nist.gov.
  • 8TURAN M S, DOGANAKSOY A, CALIK C. Statistical Analysis of Synchronous Stream Ciphers[EB/OL]. [2012-02- 16]. http: //www.ecrypt.eu.org/stream/pqpersdir/2006/012.pdf.
  • 9FILIOL E. A New Statistical Testing for Symmetric Ciphers and Hash Functions[C]//International Conference on Information, Communications and Signal Processing. [s.1.]: Springer, 2001: 21-35.
  • 10SAARINEN M-J O. Chosen-iv Statistical Attacks on Estream Stream Ciphers[C]//ECRYPT Stream Cipher Project,Report2006/013, 2006: 5-19.

二级参考文献42

  • 1张龙,吴文玲,温巧燕.流密码代数攻击的研究现状及其展望[J].通信学报,2006,27(1):91-98. 被引量:6
  • 2刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(下)[J].信息安全与通信保密,2006,28(9):17-21. 被引量:7
  • 3胡予濮.流密码的设计与分析现状[C].电子工业部.中国密码学发展报告.北京:电子工业出版社,2007:145-157.
  • 4冯登国.NESSIET程简介.信息安全与通信保密,2003,(03):1-4.
  • 5Schnorr C P,Vaudenay S.Black Box Cryptanalysis of Hash Networks Based on Multipermutations[J].Eurocrypt,1994(950):94-94.
  • 6Klimov A,Shamir A.A New Class of Invertible Mappings[J].LNCS,2002(2523):470-483.
  • 7Klimov A.Applications of T-functions in Cryptography[D].The State of Israel:Weizmann Institute of Science,2005.
  • 8Klimov A,Shamir A.Cryptographic Applications of T-functions[J].LNCS,2003(3006):248-261.
  • 9Alexander Elimov,Adi Shaeir.New Cryptographic Primitives Based on Multiword T-Functions[J].LNCS,2004(3017):1-15.
  • 10Maximov A.A New Stream Cipher:Mir-1[DB/OL].[2005-01-10][2008-04-20].http://www.ecrypt.eu.org/stream.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部