Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Shanghai Jiaotong University》 2014-10
Add to Favorite Get Latest Update

Algebraic Attacks on Trivium-Like Stream Ciphers

SUN Wen-long1,2;GUAN Jie;Information Engineering University;Beijing Satellite Navigation Center;  
Trivium stream cipher is one of the finalists of European eSTREAM project.In order to have a better study of the design ideas of Trivium,two revised Trivium algorithms were typically chosen together with Trivium as the targets.The recovery of internal state was converted into the SAT problem to analyze the security of Trivium-like stream ciphers against algebraic attacks.Six guess strategies were tried,and then the equation systems were fed to MiniSat2.0.Finally,some suggestions for the security of Triviumlike stream ciphers against algebraic attack were given according to the results.
【Fund】: 国家自然科学基金(No.61202491);; 全军军事学研究生课题(2010JY0263-149)资助项目
【CateGory Index】: TN918.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 SUN Wen-Long1) GUAN Jie1) LIU Jian-Dong2) 1)(Electronic Technology Institute,Information Engineering University,Zhengzhou 450004)2)(Beijing 2857 Mailbox,Beijing 100085);Linear Cryptanalysis of Simplified Trivium[J];Chinese Journal of Computers;2012-09
Chinese Journal Full-text Database 1 Hits
1 LI Jun-Zhi;GUAN Jie;SUN Wen-Long;Information Engineering University;;A Modified Linearization Technique and Its Application[J];Journal of Cryptologic Research;2014-05
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 Jia Yan-yan Hu Yu-pu Yang Wen-feng Gao Jun-tao(Key Laboratory of Computer Networks and Information Security,Xidian University,Xi'an 710071,China);Linear Cryptanalysis of 2-round Trivium with Multiple Approximations[J];Journal of Electronics & Information Technology;2011-01
2 SUN Guo-ping,HU Yu-pu,BAI Sheng-jiang(Key Laboratory of Computer Network and Information Security of Ministry of Education,Xidian University,Xi’an 710071);Guess Attack on Trivium Based on Chosen Differential[J];Computer Engineering;2010-09
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved