期刊文献+

对流密码RC4的区分攻击 被引量:5

Distinguishing Attack on Stream Cipher RC4
在线阅读 下载PDF
导出
摘要 在流密码体制下,RC4算法经过密钥初始化部分后所得的内部状态不是均匀分布的。为此,证明了算法密钥流第1个输出字分布的不均匀性,其等于186的概率为0.003 892 5。利用该输出字分布的不均匀性,给出改进的RC4区分攻击,攻击所需的数据为224 Byte,区分优势为0.84。通过实验验证了该区分攻击的有效性。 This paper proves the probability distribution of the first output byte which is not uniform when the inner state is not uniform proved by fluhrer after the KSA of RC4, its probability equal to 186 is 0.003 892 5, Using the obtained results, the paper proposes a new and practical distinguishing attack on RC4. The data complexity of the new attack is 224 Byte and the distinguishing advantage is 0.84. Experimental result shows the validity of the distinguishing attack.
作者 常亚勤
出处 《计算机工程》 CAS CSCD 北大核心 2011年第3期119-120,123,共3页 Computer Engineering
基金 河南省杰出青年科学基金资助项目(0312001800)
关键词 流密码 RC4算法 区分攻击 stream cipher RC4 algorithm distinguishing attack
  • 相关文献

参考文献8

  • 1Fluhrer S,MCGrew D.Statistical Analysis of the Alleged RC4 Keystream Generator[C]//Proc.of Fast Software Encryption Conference.New York,USA:Springer-Verlag,2000.
  • 2Matin I.Predicdng and Distinguishing Attack on RC4 Keystream Generator[C]//Proc.of Eurocrypt'05.Aarhus,Denmark:SpringerVerlag,2005.
  • 3Paul S,Preneel B.A New Weakness in the RC4 Keystream Generator[C]//Proc.of Fast Software Encryption Conference.Delhi,India:Springer-Verlag,2004.
  • 4Fluhrer S R,Mantin I,Shamir A.Weakness in the Key Scheduling Algorithm of RC4[C]//Proc.of Selected Areas in Cryptography'01.Toronto,Cananda:Springer-Verlag,2004.
  • 5Crowley P.Improved cryptanalysis of PY[EB/OL].(2006-01-02).http://www.ecrypt.eu.org/stream.
  • 6Baigneres T,Junod P,Vandenay S.How Far Can We Go Beyond Linear Cryptanalysis[C]//Proceedings of ASlACRYPT'04.Berlin,Germany:Springer-Vedag,2004.
  • 7陈士伟,金晨辉.改进Py区分攻击算法的计算复杂性分析[J].计算机工程,2009,35(18):125-126. 被引量:2
  • 8王秋艳,金晨辉.KeeLoq密码第1种滑动-代数攻击的改进[J].计算机工程,2009,35(16):133-134. 被引量:5

二级参考文献7

  • 1Bogdanov A. Cryptanalysis of the KeeLoq Block Cipher[EB/OL]. (2007-02-16). http://eprint.iacr.org/2007/055.
  • 2Courtois N T, Bard G V, Wagner D. Algebraic and Slide Attacks on KeeLoq[C]//Proc. of FSE'08. Eausanne, Switzerland: [s. n.], 2008.
  • 3Bard G V, Courtois N T, Jefferson C. Efficient Methods for Conversion and Solution of Sparse Systems of Low-degree Multivariate Polynomials over GF(2) via SAT-solvers[EB/OL]. (2007-01-25). http://eprint.iacr.org/2007/024.
  • 4Biham E, Neito S J Ct Py(Roo): A Fast and Secure Stream Cipher using Roiling Arrays[EB/OL]. (2005-04-29). http://www.ecrypt. eu.org/stream.
  • 5Sekar G, Paul S, Preneel B. Distinguishing Attacks on the Stream Cipher Py[EB/OL]. (2005-03-04). http://www.ecrypt.eu.org/stream.
  • 6Crowley P. Improved Cryptanalysis of Py[EB/OL]. (2006-01-02). http://www.ecrypt.eu.org/stream.
  • 7Baigneres T, Junod P, Vandenay S. How Far Can We Go Beyond Linear Cryptanalysis?[C]//Proc. of ASIACRYPT'04. Berlin, Germany: Springer Verlag, 2004.

共引文献4

同被引文献37

  • 1谌勇辉,卢德良,陈泽文,彭澄廉.基于IP的Linux外设驱动生成[J].计算机工程与应用,2005,41(20):92-94. 被引量:1
  • 2Rivest R L.The RC4 encryption algorithm,Inc.CypherPunks mailing list[EB/OL].[1994-12-09].http://cypherpunks.venona.com/date/1994/09/m-sg00304.html.
  • 3Fluhrer S,Mantin I,Shamir A.Weaknesses in the key scheduling algorithm of RC4[C]//Selected Areas in Cryptography,2001:1-24.
  • 4Mantin I,Shamir A.A practical attack on broadcast RC4[C]//Fast Software Encryption,2002:152-164.
  • 5Finney H.An RC4 cycle that can’t happen[J].Post in Sci Crypt,1994,246.
  • 6Knudsen L R,Meier W,Preneel B,et al.Analysis methods for(alleged)RC4[C]//Advances in Cryptology ASIACRYPT’98.Berlin Heidelberg:Springer,1998:327-341.
  • 7Akgün M,Kavak P,Demirci H.New results on the key scheduling algorithm of RC4[C]//Progress in Cryptology Indocrypt 2008.Berlin Heidelberg:Springer,2008:40-52.
  • 8Paul S,Preneel B.A new weakness in the RC4 key stream generator and an approach to improve the security of the cipher[C]//Fast Software Encryption.Berlin Heidelberg:Springer,2004:245-259.
  • 9Miyaji A,Sukegawa M.New analysis based on correlations of RC4 PRGA with nonzero-bit differences[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2010,93(6):1066-1077.
  • 10Biham E,Granboulan L,Nguy?n P Q.Impossible fault analysis of RC4 and differential fault analysis of RC4[C]//Fast Software Encryption.Berlin:Springer,2005:359-367.

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部