期刊文献+

RC4及其密钥流区分器 被引量:2

RC4 and Its Key Stream Distinguisher
原文传递
导出
摘要 文章介绍了RC4流密码体制,详细解释了RC4密钥流区分器的含义,描述了基于第二字节偏差的密钥流区分器,并在软件上实现了该区分器。实验结果表明,如果设定区分器的大小N=28=256,那么一次区分成功的可能性大约为59%。文章最后指出该密钥流区分器在攻击广播RC4加密中的一个应用。 Stream cipher RC4 is introduced and RC4 key stream distinguisher is elaborated. A distinguisher based on second byte bias is depicted and implemented by software. It shows that the probability of one time distinguishing successfully is about 0.59, when the size of the distinguisher is N=2^8=256. The application of the distinguisher in attacking broadcast RCA is presented,
出处 《信息安全与通信保密》 2006年第12期182-183,187,共3页 Information Security and Communications Privacy
关键词 RC4 常钥流区分器 第二字节偏差 RC4 Key stream distinguisher Second byte bias
  • 相关文献

参考文献3

  • 1[1]Alfred J Menezes,Paul C van Oorschot,Scott A Vanstone.Handbook of Applied Cryptography.New York:CRC Press,1996,192-195.
  • 2[3]Itsik Mantin,Adi Shamir.A practical attack on broadcast RC4 Fast Software Encryption.Lecture Notes in Computer Science:Fast Software Encryption,2002,(2355):152-164.
  • 3[4]R Wash.Lecture Notes on Stream Ciphers and RC4.http://acm.cwru.edu/files/.2002.

同被引文献11

  • 1董文军,李云强.FCSR的研究现状和发展[J].信息安全与通信保密,2007,29(8):9-11. 被引量:2
  • 2Lidl R, Niederreiter H. Finite Fields[M]. [s.l.]: Addison- Wesley Publishing Company, 1983.
  • 3Rueppel R A. Analysis and Design of Stream Ciphers[M]. Berlin:Springer Verlage, 1986.
  • 4Rueppel R A, Staffelbach O J. Products of Linear Recurring sequences with Maximum Complexity[J].IEEE Trans. On Information Theory, Jan.,1987, It-33(1):124-131.
  • 5MANTIN I, SHAMIR A. A Practical Attack on Broacast RCA[C]// Fast Software Encryption 2001, Lecture Notes in Computer Sciences. Berlin : Springer,2001 : 152-164.
  • 6ZOLTAK B. VMPC One-way Function and Stream Cipher [C]// Fast Software Encryption 2004, Lecture Notes in Computer Science. Berlin : Springer, 21304:210-225.
  • 7MATSUI M. Key Collisions of the RC4 Stream Cipher [ C]// Fast Software Encryption 2009, Lecture Notes in Computer Sciences. Berlin: Springer, 2009:41-53.
  • 8GOLI'C J. Linear Statistical Weakness of Alleged RC4 Keystream Generator[C]// Advances in Cryptology EU- ROCRYPT' 97, Lecture Notes in Computer Science. Berlin: Springer, 1997:226-238.
  • 9KSNUDSEN L, MEIER W, PREMEEL B, et al. VER- DOOLAEGE. S. Analysis Methods for (Alleged) RCA [ C]//Advances in Cryptography ASIACRYPT' 98, Lecture Notes in Computer Sciences. Berlin: Springer, 1998 : 327-341.
  • 10PAUL S, PRENEEL B. Analysis of Non-fortuitous Pre- dictive States of the RCA Keystream Generator[ C ]// IN- DOCRYPT 2003. Berlin : Springer, 2003:52-67.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部