首页 | 本学科首页   官方微博 | 高级检索  
     

对Shannon算法的线性区分攻击
引用本文:常亚勤, 金晨辉. 对Shannon算法的线性区分攻击[J]. 电子与信息学报, 2011, 33(1): 190-193. doi: 10.3724/SP.J.1146.2009.01626
作者姓名:常亚勤  金晨辉
作者单位:信息工程大学电子技术学院 郑州 450004
摘    要:该文基于对Shannon算法非线性反馈移存器反馈函数和非线性滤波函数进行线性逼近,得到了优势为2-28的32个新的区分器,给出了一个对流密码算法Shannon的新的线性区分攻击。该区分攻击大约需要252密钥字就能将Shannon算法的密钥流序列从随机序列中区分出来。

关 键 词:序列密码   区分攻击   线性逼近   非线性反馈移存器   Shannon算法
收稿时间:2009-12-22
修稿时间:2010-09-14

Linear Distinguishing Attack on Shannon Algorithm
Chang Ya-Qin, Jin Chen-Hui. Linear Distinguishing Attack on Shannon Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(1): 190-193. doi: 10.3724/SP.J.1146.2009.01626
Authors:Chang Ya-qin  Jin Chen-hui
Affiliation:Institute of Electronic Technology, the University of Information Engineering, Zhengzhou 450004, China
Abstract:A new distinguishing attack is presented on Shannon algorithm. The distinguish attack is built by using linear approximations of both the non-linear feedback shift register and the non-linear filtration function, and 32 distinguishers are derived which the bias is 2-28. Therefore, the Shannon algorithm is distinguishable from truly random cipher after observing 252 keystreams words on average.
Keywords:Stream ciphers  Distinguishing attack  Linear approximations  Non-linear Feedback Shift Register (NFSR)  Shannon algorithm
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号