Advanced Search
Volume 26 Issue 8
Aug.  2004
Turn off MathJax
Article Contents
Ma Wei-ju, Feng Deng-guo, Wu Zhi-ping, Zhang Bin. Cryptanalysis on a Kind of Keystream Generator[J]. Journal of Electronics & Information Technology, 2004, 26(8): 1282-1287.
Citation: Ma Wei-ju, Feng Deng-guo, Wu Zhi-ping, Zhang Bin. Cryptanalysis on a Kind of Keystream Generator[J]. Journal of Electronics & Information Technology, 2004, 26(8): 1282-1287.

Cryptanalysis on a Kind of Keystream Generator

  • Received Date: 2003-04-18
  • Rev Recd Date: 2003-08-07
  • Publish Date: 2004-08-19
  • Multiple outputs logic function is an important tool for constructing cryptog-raphy systems, and correlation immunity is a critical criterion in designing secure logic functions. In this paper, a very simple method is used to prove that two descriptions of cor-relation immunity of multiple outputs logic function are equivalent indeed. The correlation properties of a kind of keystream generator are analyzed, which is defined by multiple out-puts logic functions. It is found that this constructing method is wrong, which means that the immunity expected by the construction cannot be obtained. Walsh transform technique and linear sequential circuit approximation method are applied to find the weakness of this kind keystream generator respectively. That is to say the keystream generator constructed by this method is vulnerable.
  • loading
  • Siegenthaler T.Decrypting a class of stream ciphers using ciphertext only.IEEE Trans.on Computers,1985,C-36(1):81-85.[2]Siegenthaler T,Correlation immunity of nonlinear combining functions for cryptographic applications.IEEE Trans.on Information Theory,1984,IT-30(9):776-780.[3]Rueppel R A.Correlation immunity and the summation generator.Advances in CryptologyCrypto86.Berlin:Springer-Verlag,1986:260-272.[4]丁存生,肖国镇.流密码学及其应用.北京:国防工业出版社,1994:169-173.[5]Gopalakrishan K,Stinson D R.Three characterizations of non-binary correlation-immune and resilient functions[J].Designs,Codes and Cryptography.1995,5(3):241-251[6]陈鲁生.多输出布尔函数的密码学性质:[博士论文].天津:南开大学,2000.[7]徐汉良,吕述望.多输出相关免疫逻辑函数的等价刻划及其应用[J].电子与信息学报.2002,24(9):1185-1189浏览[8]Meier W,Staffelbach O.Nonlinear criteria for cryptographic functions.Advance in CryptologyEurocrypt89.Berlin:Springer-Verlag,1990:549-562.[9]Rueppel R A.Correlation immunity and the summation generator.Advances in CryptologyCrypto86.Berlin:Springer-Verlag,1986:260-272.[10]J.Dj.Golic.Correlation properties of a general binary combiner with memory.Journal of Cryptology,1996,9(2):111-126.[11]胡玉濮,肖国镇,张玉清.对称密码学.北京:机械工业出版社,2002:32-33.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2324) PDF downloads(790) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return