首页> 外文期刊>IEICE Transactions on Information and Systems >A Chosen-iv Key Recovery Attack On Py And Pypy
【24h】

A Chosen-iv Key Recovery Attack On Py And Pypy

机译:对Py和Pypy的选择的密钥恢复攻击

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we propose an effective key recovery attack on stream ciphers Py and Pypy with chosen IVs. Our method uses an internal-state correlation based on the vulnerability that the randomization of the internal state in the KSA is inadequate, and it improves two previous attacks proposed by Wu and Preneel (a WP-1 attack and a WP-2 attack). For a 128-bit key and a 128-bit IV, the WP-1 attack can recover a key with 2~(23) chosen IVs and time complexity 2~(72). First, we improve the WP-1 attack by using the internal-state correlation (called a P-l attack). For a 128-bit key and a 128-bit IV, the P-1 attack can recover a key with 2~(23) chosen IVs and time complexity 2~(48), which is 1/2~(24) of that of the WP-1 attack. The WP-2 attack is another improvement on the WP-1 attack, and it has been known as the best previous attack against Py and Pypy. For a 128-bit key and a 128-bit IV, the WP-2 attack can recover a key with 2~(28) chosen IVs and time complexity 2~(24). Second, we improve the WP-2 attack by using the internal-state correlation as well as the P-l attack (called a P-2 attack). For a 128-bit key and a 128-bit IV, the P-2 attack can recover a key with 223 chosen IVs and time complexity 2~(24), which is the same capability as that of the WP-2 attack. However, when the IV size is from 64 bits to 120 bits, the P-2 attack is more effective than the WP-2 attack. Thus, the P-2 attack is the known best attack against Py and Pypy.
机译:在本文中,我们针对选择的IV对流密码Py和Pypy提出了有效的密钥恢复攻击。我们的方法基于内部状态相关性,该内部状态相关性基于以下脆弱性:KSA中内部状态的随机性不足,并且它改进了Wu和Preneel先前提出的两次攻击(WP-1攻击和WP-2攻击)。对于128位密钥和128位IV,WP-1攻击可以恢复具有2〜(23)个选定IV和2〜(72)时间复杂度的密钥。首先,我们通过使用内部状态相关性来改善WP-1攻击(称为P-1攻击)。对于一个128位密钥和一个128位IV,P-1攻击可以恢复具有2〜(23)个所选IV且时间复杂度为2〜(48)的密钥,这是该密钥的1/2〜(24)。 WP-1攻击。 WP-2攻击是WP-1攻击的另一种改进,它被称为对Py和Pypy的最佳先前攻击。对于128位密钥和128位IV,WP-2攻击可以恢复具有2〜(28)个选定IV和2〜(24)时间复杂度的密钥。第二,我们通过使用内部状态相关性以及P-1攻击(称为P-2攻击)来改进WP-2攻击。对于128位密钥和128位IV,P-2攻击可以恢复具有223个所选IV且时间复杂度为2〜(24)的密钥,这与WP-2攻击具有相同的功能。但是,当IV大小从64位到120位时,P-2攻击比WP-2攻击更有效。因此,P-2攻击是针对Py和Pypy的最佳已知攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号