Chen Wei, Hu Yun, Yang Yi-xian, Niu Xin-xin. Application of Correlation Attack in Algorithm Identify[J]. Journal of Electronics & Information Technology, 2006, 28(5): 827-831.
Citation:
Chen Wei, Hu Yun, Yang Yi-xian, Niu Xin-xin. Application of Correlation Attack in Algorithm Identify[J]. Journal of Electronics & Information Technology, 2006, 28(5): 827-831.
Chen Wei, Hu Yun, Yang Yi-xian, Niu Xin-xin. Application of Correlation Attack in Algorithm Identify[J]. Journal of Electronics & Information Technology, 2006, 28(5): 827-831.
Citation:
Chen Wei, Hu Yun, Yang Yi-xian, Niu Xin-xin. Application of Correlation Attack in Algorithm Identify[J]. Journal of Electronics & Information Technology, 2006, 28(5): 827-831.
A correlation attack on A5/1 algorithm can be educed by the linear filling weakness in initiate process of A5/1 algorithm. An aberrant A5/1 sequence can be obtained from it, which have treated by statistic tools to get A5/1 statistic trait, so the distinction of A5/1 output from real random sequence can be found. Test results show that this method can work effectively.