對混沌序列密碼的相關(guān)密鑰攻擊
A Related-Key Attack on Chaotic Stream Ciphers
-
摘要: 該文首次提出了對混沌序列密碼的相關(guān)密鑰攻擊方法。該方法將線性密碼分析的思想與對混沌密碼的分割攻擊方法相結(jié)合, 利用多個(gè)相關(guān)密鑰產(chǎn)生的亂數(shù)序列對混沌密碼實(shí)施分割攻擊, 從而大大提高了分割攻擊方法的效率, 克服了當(dāng)混沌密碼吻合度分布泄漏的信息較小或密鑰規(guī)模較大時(shí), 分割攻擊方法難以將攻擊方案的計(jì)算復(fù)雜性降低在可實(shí)現(xiàn)范圍內(nèi)的局限。作為例子, 該文實(shí)現(xiàn)了對具有64bit密鑰的ZLL混沌密碼的相關(guān)密鑰攻擊, 在主頻為2.5GHz的Pentium 4-PC機(jī)上, 整個(gè)攻擊時(shí)間平均為154s, 成功率為0.96。
-
關(guān)鍵詞:
- 混沌密碼;相關(guān)密鑰攻擊;ZLL混沌密碼算法;分割攻擊; 已知明文攻擊
Abstract: In this paper the authors first present a related-key attack on chaotic stream ciphers. Combining the idea of linear cryptanalysis and divide-and-conquer attack on chaotic ciphers, the attack uses the output sequences created by multiple related keys, hence enhances the efficiency of divide-and-conquer attacks. The related-key attack breaks the confinements that it is difficult to reduce the computing complexity of divide-and-conquer attacks to a realizable range when the information amount leaked by the distribution of coincidence degree of a chaotic cipher is small or the size of key is large. As an example, the related-key attack on the ZLL chaotic cipher with 64 bits key on a Pentium 4/2.5GHz personal computer was realized and it took about 154s to recover key at a success rate 0.96. -
李樹鈞等. 一類混沌流密碼的分析[J].電子與信息學(xué)報(bào).2003, 25(4):473-479瀏覽[2]周紅, 俞軍, 凌燮亭. 混沌前饋型流密碼的設(shè)計(jì)[J]. 電子學(xué)報(bào), 1998, 26(1): 98-101.[3]金晨輝. 一個(gè)基于混沌的分組密碼算法的分析[J]. 中國工程科學(xué), 2001, 3(6): 75-80.[4]金晨輝, 高海英. 對兩個(gè)基于混沌的序列密碼算法的分析[J]. 電子學(xué)報(bào), 2004, 34(7): 1066-1070.[5]Matsui M. Linear cryptanalysis method for DES cipher[A]. In.Advance in Cryptology-Eurocrypt'93[C]. LNCS 765.Springer Verlag, 1994: 386-397.[6]周紅, 羅杰, 凌燮亭. 混沌非線性反饋密碼序列的理論和有限精度實(shí)現(xiàn)[J]. 電子學(xué)報(bào), 1997, 25(10): 57-60. -
計(jì)量
- 文章訪問數(shù): 2629
- HTML全文瀏覽量: 108
- PDF下載量: 1087
- 被引次數(shù): 0