期刊文献+

基于选择差分的Trivium猜测攻击 被引量:2

Guess Attack on Trivium Based on Chosen Differential
在线阅读 下载PDF
导出
摘要 给出一种基于选择差分对Trivium算法进行猜测攻击的方法。通过分析Trivium密钥流生成方程,确定需要改变Trivium 288 bit内部状态中的52 bit,使用错误注入改变所确定的52 bit,并生成密钥流,与原始密钥流进行差分。该方法只需猜测45 bit即可使密钥流生成方程中的177个非线性方程成为线性方程,加上已有的66个线性方程,使用高斯消元法获得剩余的243 bit,从而攻破Trivium。 This paper proposes a guess attack method on Trivium based on chosen differential.By analyzing the key generation equations of Trivium and determining 52 bit of its interior state which need to be altered,and then fault injections are used to alter these 52 bit and a faulty key stream can be obtained.The difference between the faulty key stream and the original key stream is computed,so that it only need guess 45 bit to make 177 nonlinear equations of key stream generation equations become linear equations.With the addition of 66 original linear equations,the rest 243 bit can be obtained by gauss elimination,thus Trivium is broken.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第9期129-130,133,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60833008) 广西信息与通信重点实验室基金资助项目
关键词 Trivium算法 选择差分攻击 猜测攻击 Trivium chosen differential attack guess attack
  • 相关文献

参考文献6

  • 1de Canniere C,Preneel B.Trivium:A Stream Cipher Construction Inspired By Block Cipher Design Principles[Z].(2006-01-02).http://www.ecrypt.eu.org/stream/papersdir/2006/021.pdf.
  • 2eSTREAM:ECRYPT Stream Cipher Project[Z].(2005-09-29).http://www.ecrypt.eu.org/stream/.
  • 3Khazaei S.A Reformulation of Trivium[Z].(2006-02-21).http:// www.ecrypt.eu.org/stream/phorum/read.php?1,448.
  • 4Priemuth-Schmid D,Biryukov A.Slid Pairs in Salsa 20 and Trivium[C]//Proc.of INDOCRYPT'08.Berlin,Germany:Springer,2008.
  • 5Pasalic E.Key Differentiation Attacks on Stream Ciphers[Z].(2008-12-05).http://eprint.iacr.org/.
  • 6任巧,戴紫彬,李伟,杨晓辉.基于流密码的可适配反馈移位寄存器指令[J].计算机工程,2009,35(4):162-164. 被引量:3

二级参考文献6

  • 1刘运毅,覃团发,倪皖荪,等.简评ECRYPT的候选流密码算法[D].南京:南京大学,2005.
  • 2Wu Lisa, Weaver C, Austin T. Cryptomaniac: A Fast Flexible Architecture for Secure Communication[C]//Proc. of the 28th Annual International Symp. on Computer Architecture. Goteborg, Sweden: [s. n.], 2001.
  • 3曲英杰.可重组密码逻辑的设计原理[D].北京:北京科技大学,2002.
  • 4Elbirt A J. Reconfigurable Computing for Symmetric-key Algorithms[D]. Massachusetts, USA: University of Massachusetts Lowell, 2002.
  • 5Galanis M, Kitsos P, Kostopoulos G, et al. Comparison of the Hardware Implementation of Stream Ciphers[D]. Patras, Greece: University of Patras, 2005.
  • 6Hell M, Johansson T, Meier W. Grain: A Stream Cipher for Constrained Environments[D]. Windisch, Switzerland: Lund University, 2007.

共引文献2

同被引文献20

  • 1ECRYPT. Estream: ECRYPT stream cipher project, IST-2002 507932[EB/OL]. (2010-01-16) [2012-03- 011. http://www, ecrypt, eu. org/stream/.
  • 2Canniere C D, Preneel B. TRIVIUM specifications, ECRYPT stream cipher project report [EB/OL]. (2005-03-01) E2010-01-16:. http://www, ecrypt. eu. org/stream/.
  • 3Sonmez M, Kara O. Linear approximations for 2-round Trivium [C]//Proc First International Conference on Se- curity of Information and Networks. Gazimagusa, NorthCyprus: Trafford Publishing, 2007: 96-105.
  • 4Maximov A, Biryukov A. Two trivial attacks on Trivium [C]//Carlisle M (Eds). Selected Areas in Cryptography 14th International Workshop. Ottawa, Canada: Springer, 2007: 36-55.
  • 5Priemuth-Schmid D, Biryukov A. Slid pairs in salsa 20 and Trivium [C] //Dipanwita Roy Chowdhury (Eds). INDOCRYPT, 2008. India: Springer, 2008: 1-14.
  • 6Dinur I, Shamir A. Cube attacks on tweakable black box polynomials[J]. LNCS, 2009, 5479.. 278-299.
  • 7Pasalic E. Key differentiation attacks on stream ci- phers[EB/OL]. (2008-12-05)[2010-01-03]. http:// eprint, iacr. org/.
  • 8Biryukov A, Wagner D. Slide attacks [J]. LNCS, 1999, 1636:245-259.
  • 9Kucuk O. Slide resynchronization attack on the initial ization of grain 1.0[EB/OL]. (2006-02-01) [2010 01- 03]. http://www, ecrypt, eu. org/stream/papersdir/ 2006/044. ps.
  • 10eSTREAM. The ECRYPT stream cipher project, http:// www. ecrypt, eu. org/stream/.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部