期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
流密码分析方法研究综述 被引量:2
1
作者 周照存 冯登国 《通信学报》 EI CSCD 北大核心 2022年第11期183-198,共16页
研究密码分析方法对设计密码算法至关重要。鉴于此,回顾了目前主要的流密码分析方法,研究了流密码分析方法的分类与联系,从主要技术特点的角度将其分为基于相关性质、差分性质、代数方程组和时间存储数据折中这4种类型,分别阐述了各分... 研究密码分析方法对设计密码算法至关重要。鉴于此,回顾了目前主要的流密码分析方法,研究了流密码分析方法的分类与联系,从主要技术特点的角度将其分为基于相关性质、差分性质、代数方程组和时间存储数据折中这4种类型,分别阐述了各分析方法的基本原理、主要技术及相关研究进展,并概括了其主要特点。此外,对流密码分析方法未来的发展方向进行了展望。 展开更多
关键词 流密码 线性区分分析 相关分析 碰撞分析 立方分析 代数分析 猜测确定分析 时间存储数据折中分析
在线阅读 下载PDF
Generic attacks on small-state stream cipher constructions in the multi-user setting
2
作者 Jianfu Huang Ye Luo +3 位作者 Qinggan Fu Yincen Chen Chao Wang Ling Song 《Cybersecurity》 EI CSCD 2024年第3期69-79,共11页
Small-state stream ciphers(SSCs),which violate the principle that the state size should exceed the key size by a factor of two,still demonstrate robust security properties while maintaining a lightweight design.These ... Small-state stream ciphers(SSCs),which violate the principle that the state size should exceed the key size by a factor of two,still demonstrate robust security properties while maintaining a lightweight design.These ciphers can be clas-sifed into several constructions and their basic security requirement is to resist generic attacks,ie.,the time-mem-ory-data tradeoff(TMDTO)attack.In this paper,we investigate the security of small-state constructions in the multi-user setting.Based on it,the TMDTO distinguishing attack and the TMDTO key recovery attack are developed for such a setting.It is shown that SSCs which continuously use the key can not resist the TMDTO distinguishing attack.Moreover,SSCs based on the continuous-IV-key-use construction cannot withstand the TMDTO key recovery attack when the key length is shorter than the IV length,no matter whether the keystream length is limited or not.Finally,We apply these two generic attacks to TinyJAMBU and DRACO in the multi-user setting.The TMDTO distinguish-ing attack on TinyJAMBU with a 128-bit key can be mounted with time,memory,and data complexities of 264,248,and 232,respectively.This attack is comparable with a recent work on ToSC 2022,where partial key bits of TinyJAMBU are recovered with more than 250 users(or keys).As DRACO's IV length is smaller than its key length,itis vulnerable to the TMDTO key recovery attack.The resulting attack has a time and memory complexity of both 2112,which means DRACO does not provide 128-bit security in the multi-user setting. 展开更多
关键词 Small-state stream ciphers tmdto attacks Multi-user setting
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部