首页> 外文期刊>Journal of Computer Science & Technology >Cryptanalysis of Achterbahn-Version 1 and -Version 2
【24h】

Cryptanalysis of Achterbahn-Version 1 and -Version 2

机译:Achterbahn版本1和-Version 2的密码分析

获取原文
获取原文并翻译 | 示例
           

摘要

Achterbahn is one of the candidate stream ciphers submitted to the eSTREAM, which is the ECRYPT Stream Cipher Project. The cipher Achterbahn uses a new structure which is based on several nonlinear feedback shift registers (NLFSR) and a nonlinear combining output Boolean function. This paper proposes distinguishing attacks on Achterbahn-Version 1 and -Version 2 on the reduced mode and the full mode. These distinguishing attacks are based on linear approximations of the output functions. On the basis of these linear approximations and the periods of the registers, parity checks with noticeable biases are found. Then distinguishing attacks can be achieved through these biased parity checks. As to Achterbahn-Version 1, three cases that the output function has three possibilities are analyzed. Achterbahn-Version 2, the modification version of Achterbahn-Version 1, is designed to avert attacks based on approximations of the output Boolean function. Our attack with even much lower complexities on Achterbahn-Version 2 shows that Achterbahn-Version 2 cannot prevent attacks based on linear approximations.
机译:Achterbahn是提交给eSTREAM(ECRYPT流密码项目)的候选流密码之一。密码Achterbahn使用了一种新结构,该结构基于几个非线性反馈移位寄存器(NLFSR)和非线性组合输出布尔函数。本文提出了在简化模式和完全模式下区分Achterbahn版本1和-Version 2的攻击。这些区别攻击是基于输出函数的线性近似。根据这些线性近似值和寄存器的周期,可以发现带有明显偏差的奇偶校验。然后,可以通过这些有偏差的奇偶校验来实现区分攻击。对于Achterbahn版本1,分析了输出函数具有三种可能性的三种情况。 Achterbahn-Version 2(Achterbahn-Version 1的修改版本)旨在基于输出布尔函数的近似值来避免攻击。我们在Achterbahn-Version 2上具有更低复杂性的攻击表明,Achterbahn-Version 2无法阻止基于线性近似的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号