首页> 外文OA文献 >Cryptanalysis of the Loiss Stream Cipher
【2h】

Cryptanalysis of the Loiss Stream Cipher

机译:Loiss流密码的密码分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Loiss is a byte-oriented stream cipher designed by Dengguo Feng et al. Its design builds upon the design of the SNOW family of ciphers. The algorithm consists of a linear feedback shift register (LFSR) and a non-linear finite state machine (FSM). Loiss utilizes a structure called Byte-Oriented Mixer with Memory (BOMM) in its filter generator, which aims to improve resistance against algebraic attacks, linear distinguishing attacks and fast correlation attacks. In this paper, by exploiting some differential properties of the BOMM structure during the cipher initialization phase, we provide an attack of a practical complexity on Loiss in the related-key model. As confirmed by our experimental results, our attack recovers 92 bits of the 128-bit key in less than one hour on a PC with 3 GHz Intel Pentium 4 processor. The possibility of extending the attack to a resynchronization attack in a single-key model is discussed. We also show that Loiss is not resistant to slide attacks.
机译:Loiss是由Dengguo Feng等人设计的面向字节的流密码。它的设计基于SNOW密码族的设计。该算法由线性反馈移位寄存器(LFSR)和非线性有限状态机(FSM)组成。 Loiss在其过滤器生成器中采用了一种称为字节定向内存混合器(BOMM)的结构,该结构旨在提高对代数攻击,线性区分攻击和快速相关攻击的抵抗力。在本文中,通过在密码初始化阶段利用BOMM结构的某些微分性质,我们在相关密钥模型中对Loiss提出了实用复杂性的攻击。正如我们的实验结果所证实的那样,在配备3 GHz Intel Pentium 4处理器的PC上,我们的攻击在不到一小时的时间内恢复了128位密钥的92位。讨论了在单键模型中将攻击扩展为重新同步攻击的可能性。我们还表明,Loiss不能抵抗滑动攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号