首页> 外文会议>International Conference on Information and Communications Security >Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box
【24h】

Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box

机译:使用密钥依赖的S-Box对流密码miR-1的键恢复攻击

获取原文
获取外文期刊封面目录资料

摘要

Mir-1 is a stream cipher proposed for Profile 1 at the ECRYPT Stream Cipher Project (eSTREAM). The Mir-1 designer claims a security level of at least 2{sup}128, meaning that the secret key cannot be recovered or that the Mir-1 output sequence cannot be distinguished from a truly random number sequence more efficiently than an exhaustive search. At SASC 2006, however, a distinguishing attack on Mir-1 was proposed making use of vulnerabilities in Mir-1 initialization. This paper shows that unknown entries in the key-dependent S-box used by Mir-1 can be classified into partially equivalent pairs by extending the SASC 2006 technique. It also demonstrates an attack that applies that information to recovering the Mir-1 secret key more efficiently than an exhaustive search. To the best of the authors' knowledge, the results described in this paper represent the first successful key recovery attack on Mir-1.
机译:miR-1是在Ecrypt流密码项目(Estream)的简档1的流密封。 MIR-1设计器要求至少2 {SUP} 128的安全级别,这意味着不能恢复秘密密钥,或者MIR-1输出序列不能比穷举搜索更有效地与真正随机数序列区分开。然而,在SASC 2006,提出了对MIR-1的显着攻击,利用MIR-1初始化中的漏洞。本文表明,MiR-1使用的密钥相关S箱中的未知条目可以通过延长SASC 2006技术分类为部分等同对。它还展示了一种攻击,该攻击将该信息更有效地恢复MIR-1秘密密钥,而不是详尽的搜索。据作者所知,本文描述的结果代表了MIR-1上的第一个成功的关键恢复攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号