Advanced Search
Volume 30 Issue 3
Dec.  2010
Turn off MathJax
Article Contents
Jin Chen-hui, Shi Jian-hong, Deng Hui . Analysis of the Minimum Decimation Distance of Decimation Attack[J]. Journal of Electronics & Information Technology, 2008, 30(3): 665-667. doi: 10.3724/SP.J.1146.2006.01269
Citation: Jin Chen-hui, Shi Jian-hong, Deng Hui . Analysis of the Minimum Decimation Distance of Decimation Attack[J]. Journal of Electronics & Information Technology, 2008, 30(3): 665-667. doi: 10.3724/SP.J.1146.2006.01269

Analysis of the Minimum Decimation Distance of Decimation Attack

doi: 10.3724/SP.J.1146.2006.01269
  • Received Date: 2006-08-28
  • Rev Recd Date: 2006-12-20
  • Publish Date: 2008-03-19
  • Decimation attack is one attack method of stream ciphers. In this paper, the decimation attack to prime Linear Feedback Shift Register(LFSR) sequences is investigated. The connection of decimation distance and the linear complexity of the original sequence and the decimate sequence is presented. The minimum decimate distance that makes the linear complexity of the decimate sequence less than that of the original sequence is obtained. The minimum known plaintext amount for decimation attack is given, and the practical feasibility of the decimation attack to prime LFSRs is analyzed. It is proved that the decimation attack to prime LFSR is useful possibly only in the case that the degree of LFSR is very small.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3074) PDF downloads(768) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return