期刊文献+

祖冲之序列密码的线性区分攻击分析 被引量:2

Linear distinguishing attack analysis on ZUC stream cipher
下载PDF
导出
摘要 为了探讨祖冲之算法(ZUC)的安全性,该文对ZUC算法进行了线性区分攻击分析。文中对ZUC算法中两轮非线性函数F最优化线性逼近,得到线性逼近方程式,计算线性逼近的偏差为2-22.6。利用线性逼近方程式构造仅包含输出密钥流的区分器,并寻找最优掩码使区分器的偏差最大,在最优线性掩码的基础上计算得到区分器的区分偏差为2-65.5。该攻击需要约O(2131比特)密钥流,就能把随机序列与密钥流序列区分开,从理论上证明了ZUC算法的安全性。最后通过与已有的安全性分析结果对比发现,该文的线性区分攻击结果有一定的优越性。 In order to probe into the security of the ZUC algorithm, linear distinguishing attack on the ZUC algorithm is proposed. In this paper, we first consider the linear approximation of 2-round nonlinear function F and get linear approximation equation, and the best advantage of the linear approximation equation is 2^-22.6. By combining those linear approximations, we establish a distinguisher only depending on the keystream. In order to get the best advantage of distinguisher, we search the best linear masking and the best advantage of the distinguisher is about 2^-65. 5. The result shows that the key stream generated by ZUC is distinguishable from a random sequence after observing approximately O( 2^131) bits, and it proves that the ZUC algorithm is safel By comparison, the result of the linear distinguishing attack is superior to other attacks.
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2016年第4期450-454,共5页 Journal of Nanjing University of Science and Technology
基金 国家自然科学基金(61370188 61300216) 河南省科技厅国际科技合作计划(152102410048) 河南省基础与前沿技术研究(142300410147) 河南省教育厅自然科学项目(12A520021) 河南理工大学博士基金(B2013-043 B2014-044)
关键词 祖冲之算法 线性区分攻击 线性逼近 区分器 线性掩码 ZUC linear distinguishing attack linear approximation distinguisher linear masking
  • 相关文献

参考文献5

二级参考文献68

  • 1刘满,井元伟,张嗣瀛.Delta算子系统D稳定鲁棒容错控制[J].东北大学学报(自然科学版),2004,25(8):715-718. 被引量:17
  • 2向峥嵘,张端金,陈庆伟,胡维礼.不确定模糊Delta算子系统的鲁棒H_∞控制[J].控制理论与应用,2004,21(2):299-301. 被引量:4
  • 3BERBAIN C,BILLET O,CANTEAUT A,et al.Sose-manuk,a fast software-oriented stream cipher[EB/OL].[2005-05-26].Cryptology ePrint Archiive,http://www.ecrypt.eu.org/2005/027.pdf.
  • 4AHMADI H,EGHLIDOS T,KHAZAEI S.Improved guess anddetermine attack on Sosemanuk[EB/OL][2005-12-25].http://www.ecrypt.eu.org/stream/sosemanukp3.html.
  • 5TSUNOO Y,SAITO T,SHIGERI M.Evaluation of Sose-manuk with regard to guess-and-determine attacks[EB/OL].[2006-01-02].http://www.ecrypt.eu.org/stream/sosemanukp3.html.
  • 6DING Lin,GUAN Jie.Guess and determine attack on Sose-manuk[C]//Fifth International Conference on Information As-surance and Security-CIAS2009.Xi'an,China,2009:658-661.
  • 7FENG Xiutao,LIU Jun,ZHOU Zhaocun,et al.A byte-based guess and determine attack on Sosemanuk[C]//Ad-vances in Cryptology-Asiacrypt 2010.LNCS 6477.Berlin:Springer-Verlag,2010:146-157.
  • 8LEE J K,LEE D H,PARK S.Cryptanalysis of sosemanukand SNOW 2.0 using linear masks[C]//Advances inCryptology-Asiacrypt 2008.LNCS 5350.Berlin:Springer-Verlag,2008:524-538.
  • 9CHO J Y,HERMELIN M.Improved linear cryptanalysis of So-semanuk[C]//Information,Security and Cryptology-ICISC2009.LNCS 5984.Berlin:Springer-Verlag,2010:101-117.
  • 10COPPERSMITH D,HALEVI S,JUTLA C.Cryptanalysis ofstream ciphers with linear masking[C]//Advances inCryptology-Crypto 2002.LNCS 2442.Berlin:Springer-Verlag,2002:515-532.

共引文献19

同被引文献8

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部