基于故障分析的香农流密码差分识别攻击

M. Hassanzadeh, M. Parker, T. Helleseth, Y. E. Salehani, M. Abyaneh
{"title":"基于故障分析的香农流密码差分识别攻击","authors":"M. Hassanzadeh, M. Parker, T. Helleseth, Y. E. Salehani, M. Abyaneh","doi":"10.1109/ISTEL.2008.4651385","DOIUrl":null,"url":null,"abstract":"In reference, some weak points in the design of the Shannon stream cipher and a differential distinguisher with complexity of O(214.92) keystream bits (i.e. O(29.92) keystream words) were presented. Another distinguishing attack based on a multidimensional linear transformation was presented in which require 2106.996 keystream words. Both of these attacks need to have access to the initial state that is unlikely. In this paper, a likely attack using fault analysis method is exploited to solve the mentioned problem. Additionally, a new distinguisher is proposed which improves the attack complexity to four times the complexity of running the Shannon stream cipher. Only are two differential outputs needed for successful attack with error probability equal to 0.001.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Differential distinguishing attack on the Shannon stream cipher based on fault analysis\",\"authors\":\"M. Hassanzadeh, M. Parker, T. Helleseth, Y. E. Salehani, M. Abyaneh\",\"doi\":\"10.1109/ISTEL.2008.4651385\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In reference, some weak points in the design of the Shannon stream cipher and a differential distinguisher with complexity of O(214.92) keystream bits (i.e. O(29.92) keystream words) were presented. Another distinguishing attack based on a multidimensional linear transformation was presented in which require 2106.996 keystream words. Both of these attacks need to have access to the initial state that is unlikely. In this paper, a likely attack using fault analysis method is exploited to solve the mentioned problem. Additionally, a new distinguisher is proposed which improves the attack complexity to four times the complexity of running the Shannon stream cipher. Only are two differential outputs needed for successful attack with error probability equal to 0.001.\",\"PeriodicalId\":133602,\"journal\":{\"name\":\"2008 International Symposium on Telecommunications\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Symposium on Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTEL.2008.4651385\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTEL.2008.4651385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在此基础上,提出了香农流密码和复杂度为0(214.92)个密钥流位(即0(29.92)个密钥流字)的差分区分器设计中的一些缺陷。提出了另一种基于多维线性变换的识别攻击,该攻击需要2106.996个关键字。这两种攻击都需要访问不太可能的初始状态。本文利用故障分析方法,提出了一种可能的攻击方法来解决上述问题。此外,提出了一种新的区分符,将攻击复杂度提高到运行香农流密码复杂度的四倍。成功攻击只需要两个差分输出,错误概率等于0.001。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Differential distinguishing attack on the Shannon stream cipher based on fault analysis
In reference, some weak points in the design of the Shannon stream cipher and a differential distinguisher with complexity of O(214.92) keystream bits (i.e. O(29.92) keystream words) were presented. Another distinguishing attack based on a multidimensional linear transformation was presented in which require 2106.996 keystream words. Both of these attacks need to have access to the initial state that is unlikely. In this paper, a likely attack using fault analysis method is exploited to solve the mentioned problem. Additionally, a new distinguisher is proposed which improves the attack complexity to four times the complexity of running the Shannon stream cipher. Only are two differential outputs needed for successful attack with error probability equal to 0.001.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信