Chang Ya-Qin, Jin Chen-Hui. Linear Distinguishing Attack on Shannon Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(1): 190-193. doi: 10.3724/SP.J.1146.2009.01626
Citation:
Chang Ya-Qin, Jin Chen-Hui. Linear Distinguishing Attack on Shannon Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(1): 190-193. doi: 10.3724/SP.J.1146.2009.01626
Chang Ya-Qin, Jin Chen-Hui. Linear Distinguishing Attack on Shannon Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(1): 190-193. doi: 10.3724/SP.J.1146.2009.01626
Citation:
Chang Ya-Qin, Jin Chen-Hui. Linear Distinguishing Attack on Shannon Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(1): 190-193. doi: 10.3724/SP.J.1146.2009.01626
A new distinguishing attack is presented on Shannon algorithm. The distinguish attack is built by using linear approximations of both the non-linear feedback shift register and the non-linear filtration function, and 32 distinguishers are derived which the bias is 2-28. Therefore, the Shannon algorithm is distinguishable from truly random cipher after observing 252 keystreams words on average.