A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover...A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.展开更多
Algebraic attack was applied to attack Filter-Combiner model keystream generators. We proposed the technique of function composition to improve the model, and the improved model can resist the algebraic attack. A new ...Algebraic attack was applied to attack Filter-Combiner model keystream generators. We proposed the technique of function composition to improve the model, and the improved model can resist the algebraic attack. A new criterion for designing Filter-Combiner model was also proposed: the total length L of Linear Finite State Machines used in the model should be large enough and the degree d of Filter-Combiner function should be approximate L/2.展开更多
Power analysis is a non-invasive attack against cryptographic hardware,which effectively exploits runtime power consumption characteristics of circuits.This paper proposes a new power model which combines Hamming Dist...Power analysis is a non-invasive attack against cryptographic hardware,which effectively exploits runtime power consumption characteristics of circuits.This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit.The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well.The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption.Experimental results show that,compared to CPA(Correlation Power Analysis)method,our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces.展开更多
By using the coding properties and statistic properties of the plaintext,the differential properties of the key stream sequences generated by a nonlinear combined generator were analyzed.Then a differential attack alg...By using the coding properties and statistic properties of the plaintext,the differential properties of the key stream sequences generated by a nonlinear combined generator were analyzed.Then a differential attack algorithm on the nonlinear combined sequences was proposed.At last,an attack example adopting the differential attack algorithm was presented.展开更多
基金Supported by the National Key Foundation Research "973" project (No.G1999035802) and the National Natural Science Foundation of China (No.60273027).
文摘A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.
文摘Algebraic attack was applied to attack Filter-Combiner model keystream generators. We proposed the technique of function composition to improve the model, and the improved model can resist the algebraic attack. A new criterion for designing Filter-Combiner model was also proposed: the total length L of Linear Finite State Machines used in the model should be large enough and the degree d of Filter-Combiner function should be approximate L/2.
基金supported by Major State Basic Research Development Program(No. 2013CB338004)National Natural Science Foundation of China(No.61402286, 61202372,61202371,61309021)National Science and Technology Major Project of the Ministry of Science and Technology of China (No.2014ZX01032401-001)
文摘Power analysis is a non-invasive attack against cryptographic hardware,which effectively exploits runtime power consumption characteristics of circuits.This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit.The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well.The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption.Experimental results show that,compared to CPA(Correlation Power Analysis)method,our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces.
基金supported by the National Natural Science Foundation of China (Grant No. 10872019)Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20101102110015),NCET-06-0176
基金supported by the National Natural Science Foundation of China(No.60573028)Research Foundation of National University of Defense Technology(No.JC-02-02).
文摘By using the coding properties and statistic properties of the plaintext,the differential properties of the key stream sequences generated by a nonlinear combined generator were analyzed.Then a differential attack algorithm on the nonlinear combined sequences was proposed.At last,an attack example adopting the differential attack algorithm was presented.