期刊文献+

广义自缩序列的安全性研究 被引量:3

Study of the security of the generalized self-shrinking sequences
下载PDF
导出
摘要 对广义自缩序列在丢失部分密钥时的安全强度进行了研究.设线性反馈移位寄存器的长度为L.对于vk=ak+s,当s值小于L时,使用文中给出的初态重构算法可以证明所得到的广义自缩序列具有极大的安全隐患. The security of generalized selfshrinking sequences are analyzed when a short sequence of keystream bits is lost. By using the initial reconstruction algorithm in the paper we have proved that for vk=ak+s, the security of generalized selfshrinking sequences is very weak when s is smaller than L, where L is the length of LFSR.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2003年第3期362-366,共5页 Journal of Xidian University
基金 国家自然科学基金资助项目(60273084) 高等学校博士点科研专项基金资助项目(20020701013)
关键词 广义自缩序列 安全性 初态重构 密钥 M-序列 generalized self-shrinking sequences initial reconstruction m-sequence
  • 相关文献

参考文献7

  • 1胡予濮,白国强,肖国镇.GF(q)上的广义自缩序列[J].西安电子科技大学学报,2001,28(1):5-7. 被引量:17
  • 2Ruepple R A. Analysis and Design of Stream Ciphers[ M ]. Berlin: Springer-Verlag, 1986.
  • 3Klapper A, Chan A H, Goresky M. Cascaded GMW Sequences[J]. IEEE Trans on IT, 1993, 39( 1 ) : 177-183.
  • 4Sun W. On Correlation of Generalized Geometric Sequences[J]. IEEE Trans on Inform Theory, 2001, 47(5) : 2094-2095.
  • 5Meier W, Staffelbach O. The Serf-shrinking Generator [ A]. Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Sciences: Vol 950[C]. Berlin: Springer-Verlng, 1995. 205-214.
  • 6Mihaljevic M J. A Faster Cryptanalysis of the Serf-shrinking Generator[ A]. Advances in Cryptology-ACISP'96: Vol 1 172[ C]. Berlin:Springer-Verlng, 1996. 182-189.
  • 7Zenner E, Krause M, Lucks S. Improved Cryptanalysis of the Serf-shrinking Generator[J]. Proc of ACIlX3'2001 : Vol 2119[ C]. Berlin: Springer-Verlag, 2001. 21-35.

二级参考文献1

共引文献16

同被引文献13

  • 1徐红如,张原,胡予濮.广义自缩序列的FBDD攻击[J].计算机应用研究,2004,21(9):181-182. 被引量:1
  • 2董丽华,曾勇,胡予濮.广义自缩序列的一种比较快速的密码学分析方法[J].电子与信息学报,2004,26(11):1783-1786. 被引量:1
  • 3ZhangBin,GuoDeng Feng,Bao Feng.Security analysis of the generalized self-shrinking generator[C]//Information and Communication Security 6th International Conference.2004:388.
  • 4Zhang B,Feng D.New guess-and-determine attack on the self-shrinking generator[C]//Advances in Cryptology ASIACRYPT 2006.Leture Notes in Computer,2006(4824):54-68.
  • 5Biryukov A,Shamir A.Cryptanalytic time/memory/data tradeoffs for stream ciphers[C]//Advances in Cryptology-ASIA-CRYPT 2000.Leture Notes in Computer,Berlin:Springer-Verlag,2000:1-13.
  • 6Hu Yupu, Xiao Guozhen. Generalized self-shrinking sequences. IEEE Trans. on Inform. Theory,2004, 50(4): 714-719.
  • 7Golic J Dj, O'Connor L. Embedding and probabilistic correlation attacks on clock-controlled shift registers. Advances in Cryptology-EUROCPYPT'94, Lecture Notes in Computer Science, 1995,vol.950: 230-243.
  • 8Golic J Dj. Towards fast correlation attacks on irregularly clocked shift registers. Advances in Cryptology-EUROCRYPT'95, Lecture Notes in Computer Science, 1995, vol.921: 248-261.
  • 9Mihaljevic M J. A faster cryptanalysis of the self-shrinking generator. Proc.of ACIPS'96, Lecture Notes in Computer Science. Springer-Verlag. 1996, vo1.1172: 182-189.
  • 10Saxena N R, McCluskey E J. Degree-r primitive polynomial generation- O(ra) - O(kr4) algorithms. www-crc.stanford.edu/crc_papers/primitive.pdf, July 29, 2000.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部