首页 | 官方网站   微博 | 高级检索  
     

基于E0算法的猜测决定攻击
引用本文:詹英杰,丁 林,关 杰.基于E0算法的猜测决定攻击[J].通信学报,2012,33(11):185-190.
作者姓名:詹英杰  丁 林  关 杰
作者单位:信息工程大学 电子技术学院,河南 郑州 450004
基金项目:The National Natural Science Foundation of China;The Military Science Graduate Research Foundation of Army
摘    要:对短距离无线蓝牙技术中使用的E0序列密码算法进行了猜测决定攻击,攻击中利用线性逼近的方法做出了一个巧妙的攻击假设,降低了攻击所需的猜测量,并且通过一个检验方程降低了候选状态的数量,攻击的计算复杂度为O(276),需要约988bit密钥流,属于短密钥流攻击.相对于长密钥流攻击,短密钥流攻击所需的密钥流不超过2745bit,对E0的安全性更具威胁.与目前已有的针对E0的短密钥流攻击相比,所提出猜测决定的攻击结果是最好的.

关 键 词:密码分析  E0算法  猜测决定攻击  检验方程

Guess and determine attack on E0algorithm
Ying-jie ZHAN,Lin DING,Jie GUAN.Guess and determine attack on E0algorithm[J].Journal on Communications,2012,33(11):185-190.
Authors:Ying-jie ZHAN  Lin DING  Jie GUAN
Affiliation:Electronic Technology Institute,Information Engineering University,Zhengzhou 450004,China
Abstract:A guess and determine attack on E0was presented,the stream cipher that was used in the short-range wireless technology Bluetooth.In the attack,an ingenious assumption by linear approximation to diminish the number of values that have to be guessed was made.Futher more,a test equation to reduce the number of the guessed candidates was used.The guess and determine attack on E0with time complexity of O(276)required about 988 keystream bit.Compared with long keystream attacks,short keystream attacks were more threatening to E0cipher which require less than 2 745 bit.This attack which belongs to short keystream attack was the fastest state recovery attack on E0so far compared with any other existed short keystream attacks.
Keywords:cryptanalysis  E0algorithm  guess and determine attack  test equation  
本文献已被 万方数据 等数据库收录!
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号