首页 | 本学科首页   官方微博 | 高级检索  
     

2轮Trivium的多线性密码分析
引用本文:贾艳艳, 胡予濮, 杨文峰, 高军涛. 2轮Trivium的多线性密码分析[J]. 电子与信息学报, 2011, 33(1): 223-227. doi: 10.3724/SP.J.1146.2010.00334
作者姓名:贾艳艳  胡予濮  杨文峰  高军涛
作者单位:西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071
基金项目:国家自然科学基金(60833008); 国家973计划项目(2007CB311201); 广西信息与通讯技术重点实验室基金(20902)资助课题
摘    要:作为欧洲流密码发展计划eSTREAM的7个最终获选算法之一,Trivium的安全性考察表明至今为止还没有出现有效的攻击算法。该文针对2轮Trivium,通过找出更多线性逼近方程,对其进行了多线性密码分析,提出了一种更有效的区分攻击算法。与现有的单线性密码分析算法相比,该算法攻击成功所需的数据量明显减少,即:若能找到n个线性近似方程,在达到相同攻击成功概率的前提下,多线性密码分析所需的数据量只有单线性密码分析的1/n。该研究结果表明,Trivium的设计还存在一定的缺陷,投入实用之前还需要实施进一步的安全性分析。

关 键 词:密码学   流密码   密码分析   Trivium   线性近似
收稿时间:2010-04-01
修稿时间:2010-07-11

Linear Cryptanalysis of 2-round Trivium with Multiple Approximations
Jia Yan-Yan, Hu Yu-Pu, Yang Wen-Feng, Gao Jun-Tao. Linear Cryptanalysis of 2-round Trivium with Multiple Approximations[J]. Journal of Electronics & Information Technology, 2011, 33(1): 223-227. doi: 10.3724/SP.J.1146.2010.00334
Authors:Jia Yan-yan  Hu Yu-pu  Yang Wen-feng  Gao Jun-tao
Affiliation:Key Laboratory of Computer Networks and Information Security, Xidian University, Xi’an 710071, China
Abstract:Trivium has successfully been chosen as one of the final ciphers by eSTREAM. It has a simple and elegant structure. Although Trivium has attached a lot of interest, it remains unbroken. By finding more linear approximations, a linear cryptanalysis of 2-round Trivium is made by utilizing multiple approximations and a more efficient distinguishing attack is proposed. Compared with current single linear cryptanalysis, this method allows for a reduction in the amount of data required for a successful attack. That is to say, if n linear approximations can be found, this method can supply the success rate with 1/n of the data amount required by a simple linear cryptanalysis. This study shows that there are still some defects in the design of stream cipher Trivium, further safety analysis are needed before its going into the implementation.
Keywords:Cryptology  Stream ciphers  Cryptanalysis  Trivium  Linear approximation
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号