【24h】

A Key Recovery Attack with Equivalent Keys of Stream Cipher

机译:具有流密码等效密钥的密钥恢复攻击

获取原文
获取原文并翻译 | 示例
           

摘要

If the ciphertexts generated from different keys are equivalent, these keys are called equivalent keys. In a stream cipher, since a ciphertext is generated by XORing a plaintext to a keystream, the key which generates a phase shifted keystream can also be called equivalent key. In this paper, we propose a key recovery attack using the phase shifted equivalent keys. Our attack is a new cryptanalysis method on stream ciphers. We show effectiveness of our attack by applying it to Grain v1. In Grain v1, our attack can recover an 80-bit key with time complexity of 2{sup}79 by using chosen IVs. This time complexity is lower than 2{sup}80 of exhaustive key search.
机译:如果从不同密钥生成的密文是等效的,则这些密钥称为等效密钥。在流密码中,由于通过将明文与密钥流异或来生成密文,因此生成相移密钥流的密钥也可以称为等效密钥。在本文中,我们提出了一种使用相移等效密钥的密钥恢复攻击。我们的攻击是对流密码的一种新的密码分析方法。通过将其应用于Grain v1,我们展示了攻击的有效性。在Grain v1中,我们的攻击可以使用选定的IV恢复时间复杂度为2 {sup} 79的80位密钥。此时间复杂度低于穷举关键字搜索的2 {sup} 80。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号