首页> 外文期刊>电子科学学刊(英文版) >A LINEARIZATION ATTACK ON MODIFIED E0 ALGORITHM
【24h】

A LINEARIZATION ATTACK ON MODIFIED E0 ALGORITHM

机译:改进的E0算法的线性化攻击

获取原文
获取原文并翻译 | 示例
       

摘要

A linearization attack on the Key Stream Generator (KSG) of the modified E0 algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be recovered by a linearization attack with O(260.52) operations by solving a System of Linear Equations (SLE) with at most 220.538 unknowns. Frederik Armknecht [Cryptology ePrint Archive, 2002/191]proposed a linearization attack on the KSG ofE0 algorithm with O(270.341) operations by solving an SLE with at most 224.056 unknowns, so the modification proposed by Hermelin reduces the ability of E0 to resist the linearization attack by comparing with the results of Frederik Armknecht.
机译:本文给出了一种改进的E0算法对密钥流生成器(KSG)的线性化攻击,该算法由Hermelin提出[ICISC'99,Springer LNCS 1787,2000,17-29]。通过求解最多包含220.538个未知数的线性方程组(SLE),可以通过使用O(260.52)操作进行线性化攻击来恢复初始值。 Frederik Armknecht [Cryptology ePrint Archive,2002/191]通过求解最多包含224.056个未知数的SLE,对具有O(270.341)操作的E0算法的KSG提出了线性化攻击,因此Hermelin提出的修改降低了E0抵抗E0算法的能力。通过与Frederik Armknecht的结果进行比较来进行线性化攻击。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号