Advanced Search
Volume 33 Issue 1
Feb.  2011
Turn off MathJax
Article Contents
Jia Yan-Yan, Hu Yu-Pu, Yang Wen-Feng, Gao Jun-Tao. Linear Cryptanalysis of 2-round Trivium with Multiple Approximations[J]. Journal of Electronics & Information Technology, 2011, 33(1): 223-227. doi: 10.3724/SP.J.1146.2010.00334
Citation: Jia Yan-Yan, Hu Yu-Pu, Yang Wen-Feng, Gao Jun-Tao. Linear Cryptanalysis of 2-round Trivium with Multiple Approximations[J]. Journal of Electronics & Information Technology, 2011, 33(1): 223-227. doi: 10.3724/SP.J.1146.2010.00334

Linear Cryptanalysis of 2-round Trivium with Multiple Approximations

doi: 10.3724/SP.J.1146.2010.00334
  • Received Date: 2010-04-01
  • Rev Recd Date: 2010-07-11
  • Publish Date: 2011-01-19
  • Trivium has successfully been chosen as one of the final ciphers by eSTREAM. It has a simple and elegant structure. Although Trivium has attached a lot of interest, it remains unbroken. By finding more linear approximations, a linear cryptanalysis of 2-round Trivium is made by utilizing multiple approximations and a more efficient distinguishing attack is proposed. Compared with current single linear cryptanalysis, this method allows for a reduction in the amount of data required for a successful attack. That is to say, if n linear approximations can be found, this method can supply the success rate with 1/n of the data amount required by a simple linear cryptanalysis. This study shows that there are still some defects in the design of stream cipher Trivium, further safety analysis are needed before its going into the implementation.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (4220) PDF downloads(956) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return