{"title":"基于DB的DNA计算机攻击流密码","authors":"Sattar B. Sadkhan - SMIEEE, B. S. Yaseen","doi":"10.1109/ICECCPCE46549.2019.203779","DOIUrl":null,"url":null,"abstract":"Comprehensive search (or Brute Force attack) is the most powerful method for attacking cryptosystems, especially stream cipher schemes. Parallel search is one of the most effective implementation versus sequential brute force of this method and is implemented in several traditional and unconventional ways. The current research suggests an algorithm that devises the parallelism concept that was introduced by the sticker model in the DNA computing, with the creation of a set of files that form a database that works with parallel search in a cooperative approach to increase power of parallelism and to solve, this data base includes binary strings representing compensation of partial equations for LFSRs with their initial values , the decision tree for parallel search depends on matching the selected string binaries from the database with the hypothetical final key sequence calculated from the memory complexes. The aim of the research is to develop the appropriate concepts and foundations of the biological environment for the implementation of the digital environment for the purpose of improving the complexity of time for the parallel implementation of comprehensive search.","PeriodicalId":343983,"journal":{"name":"2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"DB based DNA Computer to Attack Stream Cipher\",\"authors\":\"Sattar B. Sadkhan - SMIEEE, B. S. Yaseen\",\"doi\":\"10.1109/ICECCPCE46549.2019.203779\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Comprehensive search (or Brute Force attack) is the most powerful method for attacking cryptosystems, especially stream cipher schemes. Parallel search is one of the most effective implementation versus sequential brute force of this method and is implemented in several traditional and unconventional ways. The current research suggests an algorithm that devises the parallelism concept that was introduced by the sticker model in the DNA computing, with the creation of a set of files that form a database that works with parallel search in a cooperative approach to increase power of parallelism and to solve, this data base includes binary strings representing compensation of partial equations for LFSRs with their initial values , the decision tree for parallel search depends on matching the selected string binaries from the database with the hypothetical final key sequence calculated from the memory complexes. The aim of the research is to develop the appropriate concepts and foundations of the biological environment for the implementation of the digital environment for the purpose of improving the complexity of time for the parallel implementation of comprehensive search.\",\"PeriodicalId\":343983,\"journal\":{\"name\":\"2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCPCE46549.2019.203779\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCPCE46549.2019.203779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comprehensive search (or Brute Force attack) is the most powerful method for attacking cryptosystems, especially stream cipher schemes. Parallel search is one of the most effective implementation versus sequential brute force of this method and is implemented in several traditional and unconventional ways. The current research suggests an algorithm that devises the parallelism concept that was introduced by the sticker model in the DNA computing, with the creation of a set of files that form a database that works with parallel search in a cooperative approach to increase power of parallelism and to solve, this data base includes binary strings representing compensation of partial equations for LFSRs with their initial values , the decision tree for parallel search depends on matching the selected string binaries from the database with the hypothetical final key sequence calculated from the memory complexes. The aim of the research is to develop the appropriate concepts and foundations of the biological environment for the implementation of the digital environment for the purpose of improving the complexity of time for the parallel implementation of comprehensive search.