【24h】

Conditional Estimators: An Effective Attack on A5/1

机译:条件估计量:对A5 / 1的有效攻击

获取原文
获取原文并翻译 | 示例

摘要

Irregularly-clocked linear feedback shift registers (LFSRs) are commonly used in stream ciphers. We propose to harness the power of conditional estimators for correlation attacks on these ciphers. Conditional estimators compensate for some of the obfuscating effects of the irregular clocking, resulting in a correlation with a considerably higher bias. On GSM's cipher A5/1, a factor two is gained in the correlation bias compared to previous correlation attacks. We mount an attack on A5/1 using conditional estimators and using three weaknesses that we observe in one of A5/1's LFSRs (known as R2). The weaknesses imply a new criterion that should be taken into account by cipher designers. Given 1500-2000 known-frames (about 4.9-9.2 conversation seconds of known keystream), our attack completes within a few tens of seconds to a few minutes on a PC, with a success rate of about 91%. To complete our attack, we present a source of known-keystream in GSM that can provide the keystream for our attack given 3-4 minutes of GSM ciphertext, transforming our attack to a ciphertext-only attack.
机译:流密码中通常使用不规则时钟的线性反馈移位寄存器(LFSR)。我们建议利用条件估计器的能力对这些密码进行相关攻击。条件估计器补偿了不规则时钟的一些混淆效果,从而导致与明显更高的偏差相关。与以前的相关攻击相比,在GSM密码A5 / 1上,相关偏差获得的因子为2。我们使用条件估计器并使用我们在A5 / 1的LFSR之一(称为R2)中观察到的三个弱点对A5 / 1发起了攻击。这些弱点意味着密码设计者应该考虑一个新的标准。给定1500-2000个已知帧(已知密钥流的大约4.9-9.2会话秒),我们的攻击将在PC上在几十秒到几分钟内完成,成功率约为91%。为了完成攻击,我们提供了GSM中的已知密钥流源,可以在3-4分钟GSM密文的情况下为我们的攻击提供密钥流,从而将我们的攻击转换为仅密文攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号