首页 | 本学科首页   官方微博 | 高级检索  
     

Mlgebraic Attack on Filter-Combiner Model Keystream Generators
引用本文:WUZhi-ping YEDing-feng MAWei-ju. Mlgebraic Attack on Filter-Combiner Model Keystream Generators[J]. 武汉大学学报:自然科学英文版, 2005, 10(1): 259-262. DOI: 10.1007/BF02828664
作者姓名:WUZhi-ping YEDing-feng MAWei-ju
作者单位:StateKeyLaboratoryofInformationSecurity(GraduateSchoolofChineseAcademyofSciences),Beijing100039,China
基金项目:SupportedbytheNationalGrandFundamentalResearch973ProgramofChinaunderGrant(TG1999035803)
摘    要:Algebraic attack was applied to attack Filter-Combiner model keystream generators. We proposed thetechnique of function composition to improve the model, and the improved model can resist the algebraic attack. A new criterion for designing Filter-Combiner model was also proposed: the total length L of Linear Finite State Machines used in the model should be large enough and the degree d of Filter-Combiner function should be approximate [L/2].

关 键 词:代数攻击 过滤组合模型 流密码 XL算法 解密 信息安全 密码分析
收稿时间:2004-05-30

Algebraic attack on Filter-Combiner model keystream generators
Wu Zhi-ping,Ye Ding-feng,Ma Wei-ju. Algebraic attack on Filter-Combiner model keystream generators[J]. Wuhan University Journal of Natural Sciences, 2005, 10(1): 259-262. DOI: 10.1007/BF02828664
Authors:Wu Zhi-ping  Ye Ding-feng  Ma Wei-ju
Affiliation:Graduate School of Chinese Academy of Sciences
Abstract:Algebraic attack was applied to attack Filter-Combiner model keystream generators. We proposed the technique of function composition to improve the model, and the improved model can resist the algebraic attack. A new criterion for designing Filter-Combiner model was also proposed: the total length L of Linear Finite State Machines used in the model should be large enough and the degree d of Filter-Combiner function should be approximate L/2.
Keywords:algebraic attack  Filter-Combiner model  stream cipher    XL”   algorithm  function composition
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号