首页> 外文会议>Information and Communications Security >An Efficient Known Plaintext Attack on FEA-M
【24h】

An Efficient Known Plaintext Attack on FEA-M

机译:对FEA-M的有效已知明文攻击

获取原文

摘要

Yi et al. have proposed a cipher called the fast encryption algorithm for multimedia (FEA-M). Recently Mihaljevic and Kohno pointed out that FEA-M is insecure. However, their attacks are not efficient: their chosen plaintext attack and known plaintext attack require 2~(37)-bit chosen plaintext and 2~(60)-bit known plaintext, respectively. In this paper we give an efficient known plaintext attack against FEA-M. Our attack requires only 2~(28)-bit known plaintext and about 2~(33) XOR operations.
机译:Yi等。已经提出了一种称为多媒体快速加密算法(FEA-M)的密码。最近,Mihaljevic和Kohno指出FEA-M是不安全的。但是,它们的攻击效率不高:他们选择的明文攻击和已知的明文攻击分别需要2〜(37)位的选择明文和2〜(60)位的已知明文。在本文中,我们给出了针对FEA-M的有效的已知明文攻击。我们的攻击只需要2〜(28)位的已知明文和大约2〜(33)个XOR操作即可。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号