Advanced Search
Volume 28 Issue 5
Aug.  2010
Turn off MathJax
Article Contents
Chen Wei, Hu Yun, Yang Yi-xian, Niu Xin-xin. Application of Correlation Attack in Algorithm Identify[J]. Journal of Electronics & Information Technology, 2006, 28(5): 827-831.
Citation: Chen Wei, Hu Yun, Yang Yi-xian, Niu Xin-xin. Application of Correlation Attack in Algorithm Identify[J]. Journal of Electronics & Information Technology, 2006, 28(5): 827-831.

Application of Correlation Attack in Algorithm Identify

  • Received Date: 2004-12-20
  • Rev Recd Date: 2005-11-28
  • Publish Date: 2006-05-19
  • A correlation attack on A5/1 algorithm can be educed by the linear filling weakness in initiate process of A5/1 algorithm. An aberrant A5/1 sequence can be obtained from it, which have treated by statistic tools to get A5/1 statistic trait, so the distinction of A5/1 output from real random sequence can be found. Test results show that this method can work effectively.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2583) PDF downloads(1125) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return