首页> 外文OA文献 >Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering
【2h】

Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering

机译:对SOBER-t32和SOBER-t16的代数攻击而不会结结巴巴

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obtain multivariate equations of degree 10. Then, an algebraic attack is developed using a collection of output bits whose relation to the initial state of the LFSR can be described by low-degree equations. The resulting system of equations contains 2^69 equations and monomials, which can be solved using the Gaussian elimination with the complexity of 2^196.5. For the second attack, we build a multivariate equation of degree 14. We focus on the property of the equation that the monomials which are combined with output bit are linear. By applying the Berlekamp-Massey algorithm, we can obtain a system of linear equations and the initial states of the LFSR can be recovered. The complexity of attack is around O(2^100) with 2^92 keystream observations. The second algebraic attack is applicable to SOBER-t16 without stuttering. The attack takes around O(2^85) CPU clocks with 2^78 keystream observations.
机译:本文介绍了对SOBER-t32和SOBER-t16的代数攻击,而不会出现口吃。对于未中断的SOBER-t32,实施了两种不同的攻击。在第一个攻击中,我们获得了度数为10的多元方程。然后,使用一组输出位来开发代数攻击,这些输出位与LFSR初始状态的关系可以用低次方程来描述。所得的方程组包含2 ^ 69个方程和单项式,可以使用高斯消除来求解,其复杂度为2 ^ 196.5。对于第二次攻击,我们建立了一个度数为14的多元方程。我们关注方程的性质,即与输出位组合的单项式是线性的。通过应用Berlekamp-Massey算法,我们可以获得线性方程组,并且可以恢复LFSR的初始状态。攻击的复杂度约为O(2 ^ 100),观察到2 ^ 92个密钥流。第二代数攻击适用于SOBER-t16,而不会卡顿。攻击占用了2 ^ 78个密钥流观察值,占用了O(2 ^ 85)个CPU时钟。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号