对Shannon算法的线性区分攻击
doi: 10.3724/SP.J.1146.2009.01626
Linear Distinguishing Attack on Shannon Algorithm
-
摘要: 该文基于对Shannon算法非线性反馈移存器反馈函数和非线性滤波函数进行线性逼近,得到了优势为2-28的32个新的区分器,给出了一个对流密码算法Shannon的新的线性区分攻击。该区分攻击大约需要252密钥字就能将Shannon算法的密钥流序列从随机序列中区分出来。Abstract: A new distinguishing attack is presented on Shannon algorithm. The distinguish attack is built by using linear approximations of both the non-linear feedback shift register and the non-linear filtration function, and 32 distinguishers are derived which the bias is 2-28. Therefore, the Shannon algorithm is distinguishable from truly random cipher after observing 252 keystreams words on average.
计量
- 文章访问数: 3255
- HTML全文浏览量: 150
- PDF下载量: 893
- 被引次数: 0