首页> 外文会议>Information Security and Privacy >Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
【24h】

Related-Key Chosen IV Attacks on Grain-v1 and Grain-128

机译:针对Grain-v1和Grain-128的相关关键选择IV攻击

获取原文
获取原文并翻译 | 示例

摘要

The slide resynchronization attack on Grain was proposed in [6]. This attack finds related keys and initialization vectors of Grain that generate the 1-bit shifted keystream sequence. In this paper, we extend the attack proposed in [6] and propose related-key chosen IV attacks on Grain-v1 and Grain-128. The attack on Grain-v1 recovers the secret key with 2~(22.59)chosen IVs, 2~(26.29)-bit keystream sequences and 2~(22.90) computational complexity. To recover the secret key of Grain-128, our attack requires 2~(26.59) chosen IVs, 2~(31.39)-bit keystream sequences and 2~(27.01) computational complexity. These works are the first known key recovery attacks on Grain-vl and Grain-128.
机译:在[6]中提出了对谷物的滑动再同步攻击。此攻击会发现相关的Grain密钥和初始化向量,这些向量会生成1位移位的密钥流序列。在本文中,我们扩展了[6]中提出的攻击,并提出了针对Grain-v1和Grain-128的相关密钥选择的IV攻击。对Grain-v1的攻击可恢复具有2〜(22.59)个选择的IV,2〜(26.29)位的密钥流序列和2〜(22.90)的计算复杂度的密钥。要恢复Grain-128的密钥,我们的攻击需要选择2〜(26.59)个IV,2〜(31.39)位密钥流序列和2〜(27.01)个计算复杂度。这些作品是针对Grain-vl和Grain-128的第一个已知的密钥恢复攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号