【24h】

A New Attack on the LEX Stream Cipher

机译:关于LEX流密码的新攻击

获取原文

摘要

In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we present a key recovery attack on LEX. The attack requires about 2{sup}36.3 bytes of key-stream produced by the same key (possibly under many different IVs), and retrieves the secret key in time of 2{sup}112 simple operations. Following a preliminary version of our attack, LEX was discarded from the final portfolio of eSTREAM.
机译:在[6]中,Biryukov介绍了一种新的流密码设计方法,称为漏萃取。基于该方法和AES块密码的流密码LEX被选中到Estream竞争的第3阶段。建议的方法似乎有前途和LEX,由于其优雅,简单性和性能预计将被选为Estraeam产品组合。在本文中,我们对Lex提供了一个关键恢复攻击。该攻击需要大约2 {sup} 36.3个字节的键流由相同键(可能在许多不同的IVS下)生成的键流,并检索2 {sup} 112简单操作的时间的密钥。在我们攻击的初步版本之后,LEX从最终的Estream投资组合中丢弃。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号