期刊文献+

模m加法的一类线性逼近关系研究

Research on the Linear Approximation Relationship of Addition Modulo m
在线阅读 下载PDF
导出
摘要 该文研究模m加法的线性逼近问题,其中m为大于3的整数.利用分类计数方法,文中给出了任意k个整数求和模m的最低两个比特异或值用每一个整数的最低两个比特异或值去逼近时概率值的精确计算公式.此外,对于k=2、3或4,文中还进一步分析了这类线性逼近的效果. The linear approximation of addition modulo m is studied in this paper,where m 〉3. Using classification counting method,an exact probability formula of the XOR of the lowest two bits of the summation of k integers modulo m approximate to the XOR of the lowest two bits of every integer is given in this paper. M oreover,the effect of this approximation is discussed for k = 2,3 or 4.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第11期2194-2199,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.61272042 No.61402524) 信息保障技术重点实验室开放基金(No.KJ-13-005)
关键词 密码学 线性分析 模加法 线性逼近 cryptography linear cryptanalysis modular addition linear approximation
  • 相关文献

参考文献15

二级参考文献54

  • 1张龙,吴文玲,温巧燕.mod 2^n加运算与F2上异或运算差值的概率分布和递推公式[J].北京邮电大学学报,2007,30(1):85-89. 被引量:12
  • 2Doug W, Bruce S, and Stefan L, et al.. Helix: Fast encryption and authentication in a single cryptographic primitive [C]. Fast Software Encryptiou 2003, LNCS 2887: 330-347.
  • 3Ekdahl P and Johansson T. SNOW-A new stream cipher[C]. First Open NESSIE Workshop, KU-Leuven, 2000. Submission to NESSIE. http://www.it.lth.se/cryptology/ snow/, 2000.
  • 4Dawson E and Chen K. Dragon: A fast word based stream cipher[C], eSTREAM, ECRYPT Stream Cipher Project, Report 2005/006, 2005. http://www.ecrypt.eu.org/stream.
  • 5Sekar G, Paul S, and Preneel B. Distinguishing attacks on the stream cipher Py[C]. eSTREAM, ECRYPT Stream Cipher Project, report 2005/081, 2005.
  • 6Crowley P. Improved cryptanalysis of Py[C]. eSTREAM, ECRYPT Stream Cipher Project, report 2006/010, 2006.
  • 7Joo Y C and Josef P. An Improved Distinguisher for Dragon[C]. eSTREAM, ECRYPT Stream Cipher Project, report 2007/002, 2007.
  • 8Baigneres T, Junod P, and Vandenay S. How far can we go beyond linear cryptanalysis IC]. Asiacrypt 2004, LNCS 3329: 432-450.
  • 9Driscoll Kevin. BeepBeep:Embedded Real-Time Encryption[A].Fast Software Encryption 2002[C]. LNCS 2356,2002,164-178.
  • 10Hawkes P,Rose G.Primitive specification and supporting documentation for sober-t16 sub-mission to nessie[EB/OL].2000(2000-09-16)[2006-01-01].http:∥homes.esat.kuleuven.be~jlanof/stream/papers/sobert16hr.doc.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部