首页 | 本学科首页   官方微博 | 高级检索  
     

流密码Sosemanuk的区分攻击
引用本文:李顺波,胡予濮,王艳.流密码Sosemanuk的区分攻击[J].哈尔滨工程大学学报,2012(2):259-262.
作者姓名:李顺波  胡予濮  王艳
作者单位:西安电子科技大学理学院;西安建筑科技大学理学院;西安电子科技大学计算机网络与信息安全教育部重点实验室
基金项目:国家自然科学基金资助项目(60833008,60970119);国家“973”计划(2007CB311201);保密通信国防科技重点实验室基金资助项目(9140C110201110C1102);西安建筑科技大学青年基金资助项目(QN1024)
摘    要:作为eSTREAM计划的7个最终获选算法之一,Sosemanuk至今未见有效的攻击算法.针对流密码Sosemanuk的线性弱点,利用线性掩码技术比特异或代替模加和Trans函数运算,把非线性函数转化为线性函数,依据线性逼近建立区分器;设计了一种基于Sosemanuk中有限状态机(FSM)和Serpent1线性特征的区分攻击.结果表明,需要2221bit就能将流密码Sosemanuk的密钥流序列从随机序列中区分出来.

关 键 词:密码分析  流密码  Sosemanuk  区分攻击  线性掩码

Distinguishing attack on the stream cipher Sosemanuk
LI Shunbo,HU Yupu,WANG Yan.Distinguishing attack on the stream cipher Sosemanuk[J].Journal of Harbin Engineering University,2012(2):259-262.
Authors:LI Shunbo  HU Yupu  WANG Yan
Affiliation:1,3(1.School of Science,Xidian University,Xi′an 710071,China;2.Key Lab of Computer Networks and Information Security of Ministry of Education,Xidian University,Xi′an 710071,China;3.School of Science,Xi′an University of Architecture and Technology,Xi′an 710055,China)
Abstract:Sosemanuk has successfully been chosen as one of the final stream ciphers by eSTREAM.Although Sosemanuk has attracted great interest,it has not been completely developed.Due to the linear defect in the Sosemanuk stream cipher,a distinguishing attack based on the linear character of the finite state machine(FSM) and Serpent1 was proposed.This method used linear masks by replacing modular additions and Trans functions by exclusive ORs(XORs),transforming the nonlinear functions into linear functions.Then,a distinguisher was built.The results show that the keystream generated in Sosemanuk is distinguishable from a random sequence after observing approximately 2221 bits.
Keywords:cryptanalysis  stream cipher  Sosemanuk  distinguishing attack  linear masking
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号