对混沌序列密码的相关密钥攻击
A Related-Key Attack on Chaotic Stream Ciphers
-
摘要: 该文首次提出了对混沌序列密码的相关密钥攻击方法。该方法将线性密码分析的思想与对混沌密码的分割攻击方法相结合, 利用多个相关密钥产生的乱数序列对混沌密码实施分割攻击, 从而大大提高了分割攻击方法的效率, 克服了当混沌密码吻合度分布泄漏的信息较小或密钥规模较大时, 分割攻击方法难以将攻击方案的计算复杂性降低在可实现范围内的局限。作为例子, 该文实现了对具有64bit密钥的ZLL混沌密码的相关密钥攻击, 在主频为2.5GHz的Pentium 4-PC机上, 整个攻击时间平均为154s, 成功率为0.96。Abstract: In this paper the authors first present a related-key attack on chaotic stream ciphers. Combining the idea of linear cryptanalysis and divide-and-conquer attack on chaotic ciphers, the attack uses the output sequences created by multiple related keys, hence enhances the efficiency of divide-and-conquer attacks. The related-key attack breaks the confinements that it is difficult to reduce the computing complexity of divide-and-conquer attacks to a realizable range when the information amount leaked by the distribution of coincidence degree of a chaotic cipher is small or the size of key is large. As an example, the related-key attack on the ZLL chaotic cipher with 64 bits key on a Pentium 4/2.5GHz personal computer was realized and it took about 154s to recover key at a success rate 0.96.
-
李树钧等. 一类混沌流密码的分析[J].电子与信息学报.2003, 25(4):473-479浏览[2]周红, 俞军, 凌燮亭. 混沌前馈型流密码的设计[J]. 电子学报, 1998, 26(1): 98-101.[3]金晨辉. 一个基于混沌的分组密码算法的分析[J]. 中国工程科学, 2001, 3(6): 75-80.[4]金晨辉, 高海英. 对两个基于混沌的序列密码算法的分析[J]. 电子学报, 2004, 34(7): 1066-1070.[5]Matsui M. Linear cryptanalysis method for DES cipher[A]. In.Advance in Cryptology-Eurocrypt'93[C]. LNCS 765.Springer Verlag, 1994: 386-397.[6]周红, 罗杰, 凌燮亭. 混沌非线性反馈密码序列的理论和有限精度实现[J]. 电子学报, 1997, 25(10): 57-60.
计量
- 文章访问数: 2617
- HTML全文浏览量: 105
- PDF下载量: 1086
- 被引次数: 0