期刊文献+

针对简化版Trivium算法的线性分析 被引量:5

Linear Cryptanalysis of Simplified Trivium
在线阅读 下载PDF
导出
摘要 流密码Trivium算法是欧洲密码工程eSTREAM的7个最终获选算法之一.该文针对初始化为288轮的简化版Trivium算法进行了线性分析,更正了Turan等人给出的关于密钥、初始化向量和密钥流比特的表达式,并给出了当允许选取特殊的密钥和IV时,搜索最佳线性逼近式的算法.据此算法,找到了3个线性偏差为2-25的线性逼近式,改进了Turan等人给出的线性偏差为2-31的线性分析结果. Stream cipher Trivium is one of the seven finalists of the eSTREAM project. In this paper, we apply linear cryptanalysis to the simplified Trivium with the initialization of 288 rounds. The equation, which involves the key bits, initial vector bits and the first keystream bit in linear approximations for 288-round Trivium of Turan, is corrected. In addition, when special Key bits and IV bits are allowed to be chosen, the algorithm to search the linear approximations with the biggest linear bias is presented. Based on this algorithm, 3 linear approximations with the same linear bias 2-ZSare found, which is better than Turan's 2-al.
出处 《计算机学报》 EI CSCD 北大核心 2012年第9期1890-1896,共7页 Chinese Journal of Computers
基金 国家自然科学基金(61202491)及研究课题(2010JY0263-149)资助
关键词 密码分析 线性分析 Trivium 流密码 cryptanalysis linear cryptanalysis Trivium stream cipher
  • 相关文献

参考文献12

  • 1eSTREAM. The ECRYPT stream cipher project, http:// www. ecrypt, eu. org/stream/.
  • 2De Cannibre C, Preneel B. "Frivium specifications, http:// www. ecrypt, eu. org/stream/p3ciphers/trivium/trivium_p3. pdf.
  • 3Maximov A, Biryukov A. Two trivial attacks on Trivium// Proceedings of the Workshop on The State of the Art of Stream Ciphers (SASC2007). Bochum, 2007:1-16.
  • 4Raddum H. Cryptanalytic results on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/039, 2006.
  • 5Priemuth-Schmid D, Biryukov A. Slid pairs in salsa20 and Trivium//Proceedings of the INDOCRYPT 2008 Proceedings.
  • 6Lecture Notes in Computer Science 5365. Berlin, 2008:1-14 Dinur I, Shamir A. Cube attacks on tweakable black box pol- ynomials. Cryptology .ePrint Archive, Report 2008/385, 2008.
  • 7孙国平,胡予濮,白生江.基于选择差分的Trivium猜测攻击[J].计算机工程,2010,36(9):129-130. 被引量:2
  • 8Turan M S, Kara O. Linear approximations for 2-round Trivium//Proceedings of the Workshop on the State of the Art of Stream Cipher (SASCb-007). Boehum, 2007:22-31.
  • 9贾艳艳,胡予濮,杨文峰,高军涛.2轮Trivium的多线性密码分析[J].电子与信息学报,2011,33(1):223-227. 被引量:8
  • 10Matsui M. Linear cryptanalysis method for DES cipher// Proceedings of the Advances in Cryptology-EUROCRYPT' 93. Lecture Notes in Computer Science 765. Lofthus, 1993.- 386- 397.

二级参考文献18

  • 1de Canniere C,Preneel B.Trivium:A Stream Cipher Construction Inspired By Block Cipher Design Principles[Z].(2006-01-02).http://www.ecrypt.eu.org/stream/papersdir/2006/021.pdf.
  • 2eSTREAM:ECRYPT Stream Cipher Project[Z].(2005-09-29).http://www.ecrypt.eu.org/stream/.
  • 3Khazaei S.A Reformulation of Trivium[Z].(2006-02-21).http:// www.ecrypt.eu.org/stream/phorum/read.php?1,448.
  • 4Priemuth-Schmid D,Biryukov A.Slid Pairs in Salsa 20 and Trivium[C]//Proc.of INDOCRYPT'08.Berlin,Germany:Springer,2008.
  • 5Pasalic E.Key Differentiation Attacks on Stream Ciphers[Z].(2008-12-05).http://eprint.iacr.org/.
  • 6De Canniere C and Preneel B. Trivium: a stream cipher construction inspired by block cipher design principle[R]. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/30 (2005), http://www.ecrypt.eu.org/stream, 2009.12.
  • 7De Canniere C and Preneel B. Trivium specifications. www.ecrypt.eu.org/stream/p3ciphers/trivium /trivium p3. pdf, 2009.10.
  • 8Maximov A and Biryukov A. Two trivial attacks on TRIVIUM[C]. Workshop on The State of the Art of Stream Ciphers (SASC2007), Bochum, 2007: 1-16.
  • 9Eiban T, Pilz E, and Steck S. Comparing and optimizing two generic attacks on Bibium[C]. Workshop on The State of the Art of Stream Ciphers (SASC2008), Lausanne, 2008: 57-68.
  • 10Khazaei S, Hasanzaden M M, and Kiaei M S. Linear sequential circuit approximation of Grain and Trivium stream ciphers [R]. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/063, 2005.

共引文献9

同被引文献50

  • 1刘静,钟伟才,刘芳,焦李成.组织进化算法求解SAT问题[J].计算机学报,2004,27(10):1422-1428. 被引量:8
  • 2凌应标,吴向军,姜云飞.基于子句权重学习的求解SAT问题的遗传算法[J].计算机学报,2005,28(9):1476-1482. 被引量:15
  • 3ECRYPT.eSTREAM:ECRYPT Stream Cipher Project,IST2002-507932[EB/OL].http://www.ecrypt.eu.org/stream,2005-04-12.
  • 4Cannière C D,Preneel B.Trivium[A].New Stream Cipher Designs[C].Germany:Springer-Verlag,2008.244-246.
  • 5Turan M S,Kara O.Linear Approximations for 2-round Trivium[EB/OL].http://www.ecrypt.eu.org/stream/papersdir/2007/008.pdf,2007-12-28.
  • 6Maximov A,Biryukov A.Two trivial attacks on trivium[A].Selected Areas in Cryptography[C].Germany:Springer-Verlag,2007.36-55.
  • 7Wong K K,Gregory V B.Improved algebraic cryptanalysis of QUAD,Bivium and Trivium via graph partitioning on equation systems[A].The 15th Australasian Conference on Information Security and Privacy[C].Germany:Springer-Verlag,2010.19-36.
  • 8Huang Z Y,Lin D D.Attacking Bivium and Trivium with the characteristic set method[A].Progress in CryptologyAFRICACRYPT 2011[C].Germany:Springer-Verlag,2011.77-91.
  • 9Schilling T E,Raddum H.Analysis of Trivium using compressed right hand side equations[A].The 14th International Conference on Information Security and Cryptology[C].Germany:Springer-Verlag,2011.18-32.
  • 10Priemuth-Schmid D,Biryukov A.slid pairs insalsa 20 and Trivium[A].INDOCRYPT 2008[C].Germany:SpringerVerlag,2008.1-14.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部