期刊文献+

基于随机性测试的SNOW2.0算法部件分析与改进 被引量:2

Analysis and Improvement of the Components of SNOW 2.0 Based on Statistical Tests
下载PDF
导出
摘要 SNOW族算法是目前序列密码算法设计的一个主流方向。针对SNOW族算法现有的安全漏洞,该文以最具代表性的SNOW 2.0算法为研究对象,采用随机性测试方法对其多个域上模加、非线性S盒以及线性反馈移位寄存器(LFSR)3个核心部件进行分析,提出基于随机S盒和高性能LFSR等部件改进的多套改进方案,有效提升SNOW族算法的安全性和实现性能。 The SNOW family is a main trend of the design of the stream cipher. Because of the security vulnerabilities of the SNOW family~ this paper selects SNOW 2.0 algorithm which is the most representative of the family as a research object. Three core components of SNOW 2.0 that are mold addition on more than one domain, nonlinear S-box and Linear Feedback Shift Register (LFSR) are analyzed using statistical tests. Several improved algorithms are proposed based on improving random S-box and improving high performance LFSR. The result enhances effectively the security and performance of SNOW family.
出处 《电子与信息学报》 EI CSCD 北大核心 2014年第1期82-87,共6页 Journal of Electronics & Information Technology
基金 国家863计划项目(2011AA70110016)资助课题
关键词 序列密码 SNOW 2 0 随机性测试 模加 S盒 线性反馈移位寄存器(LFSR) Stream cipher SNOW 2.0 Statistical test Mold addition S box Linear Feedback Shift Register(LFSR)
  • 相关文献

参考文献17

  • 1Ekdahl P,Johansson T. SNOW a new stream cipher[A].KU-Leuven,2000.167-168.
  • 2Ekdahl P,Johansson T. A new version of the stream cipher SNOW[A].Springer Berlin Heidelberg,2003.47-61.
  • 3Berbain C,Billet O,Canteaut a. New Stream Cipher Designs:Sosemanuk,A Fast Software-oriented Stream Cipher[M].Berlin:Springer Berlin Heidelberg,2008.98-118.
  • 4ETSI/SAGE. Specification of the 3GPP confidentiality and integrity algorithms UEA2&UIA2.Document 2:SNOW 3G specification[S].2005.
  • 5Orhanou G,El Hajji S,Lakbabi A. Analytical evaluation of the stream cipher ZUC[A].IEEE,Tangier,Morocco,2012.927-930.
  • 6Billet O,Gilbert H. Topics in Cryptology CT-RSA 2005:Resistance of SNOW 2.0 Against Algebraic Attacks[M].Berlin:Springer Berlin Heidelberg,2005.19-28.
  • 7Nyberg K,Wallén J. Improved linear distinguishers for SNOW 2.0[A].Springer Berlin Heidelberg,2006.144-162.
  • 8Barenghi A,Trichina E. Fault Analysis in Cryptography:Fault Attacks on Stream Ciphers[M].Berlin:Springer Berlin Heidelberg,2012.239-255.
  • 9Salehani Y E,Kircanski A,Youssef A. Progress in Cryptology AFRICACRYPT 2011:Differential Fault Analysis of Sosemanuk[M].Berlin:SpringerBerlin Heidelberg,2011.316-331.
  • 10Rukhin A,Soto J,Nechvatal J. A statistical test suite for random and pseudorandom number generators for cryptographic applications[OL].http://www.nist.gov,2011.

同被引文献10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部