首页> 外文会议>Annual International Cryptology Conference; 20040815-20040819; Santa Barbara,CA; US >Faster Correlation Attack on Bluetooth Keystream Generator E0
【24h】

Faster Correlation Attack on Bluetooth Keystream Generator E0

机译:蓝牙Keystream Generator E0的更快相关攻击

获取原文
获取原文并翻译 | 示例

摘要

We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correlations is formulated by a recursive expression, which makes it easier to calculate correlations of the finite state machine output sequences up to 26 bits for E0 and allows us to verify the two known correlations to be the largest for the first time. Second, we apply the concept of convolution to the analysis of the distinguisher based on all correlations, and propose an efficient distinguisher due to the linear dependency of the largest correlations. Last, we propose a novel maximum likelihood decoding algorithm based on fast Walsh transform to recover the closest codeword for any linear code of dimension L and length n. It requires time O(n + L • 2~L) and memory min(n, 2~L). This can speed up many attacks such as fast correlation attacks. We apply it to E0, and our best key-recovery attack works in 2~(39) time given 2~(39) consecutive bits after O(2~(37)) precomputation. This is the best known attack against E0 so far.
机译:我们通过相关性研究针对E0(蓝牙中使用的密钥流生成器)的区分攻击和密钥恢复攻击。首先,一种强大的相关性计算方法由一个递归表达式表示,这使得更容易计算E0的有限状态机输出序列的相关性(最多26位),并使我们能够验证两个已知相关性对于E0最大。第一次。其次,我们将卷积的概念应用于基于所有相关性的区分器分析,并由于最大相关性的线性依赖性而提出了一种有效的区分器。最后,我们提出了一种基于快速沃尔什变换的新颖的最大似然解码算法,以恢复尺寸为L和长度为n的任何线性码的最近码字。它需要时间O(n + L•2〜L)和内存min(n,2〜L)。这样可以加快许多攻击,例如快速相关攻击。我们将其应用于E0,在给定O(2〜(37))连续2〜(39)个连续位的情况下,我们最好的密钥恢复攻击将在2〜(39)个时间内起作用。这是迄今为止针对E0的最著名的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号