期刊文献+

软判决快速相关攻击新算法与应用 被引量:4

A Novel Algorithm of Soft Fast Correlation Attack and Applications
下载PDF
导出
摘要 近年来,密码的快速相关攻击(FCA)是一个研究热点.由于采用了一系列纠错编码的译码新技术,使得该问题的研究取得了很大的进展.但如何使这些新技术充分地适应具体的密钥序列的攻击依然是一个公开的研究课题.首先把模2域上的FCA算法推广成软判决快速相关攻击(SFCA)算法,并给出了如何根据信道信噪比情况配置最佳的参数的方法.实验表明,在BPSK调制下,SFCA算法比FCA算法有2dB以上的增益.作为SFCA算法的应用,给出了实现扩频通信中的m序列的快速同步捕获的新方法.与最近Yang(2004)提出的RSSE方法比较,新方法无论是捕获性能还是捕获速度都有了大幅度地提升,而且在低信噪比通信情况下,同步捕获所需的码片数只是RSSE方法所需的码片数的1/20. The main researches on improving fast correlation attacks (FCA) are focused on adapting the usual decoding algorithms and the best involved parameters to the practical applications. In this paper a novel soft fast correlation attack (SFCA) is presented for sequences obtained from a highly noisy BPSK channel, and a feasible strategy is provided to adapt the involved parameters in the techniques to fit in with the concrete applications in different channel situations. Fast Walsh transformation is used to realize decoding procedure instead of exhaust search used by conventional attacks. A theorem is derived, which exploits that log-likelihood ratio of a correct state estimate is just the value of corresponding Walsh transformation. The simulation results show that the proposed SFCA algorithm for sequences from BPSK channel has a gain that exceeds 2 dB compared with FCA algorithm for sequences from BSC channel. As a practical application, an efficient acquisition based on SFCA of m-sequence in spread spectrum communication system is given. Compared with the recent RSSE acquisition scheme proposed by Yang, this scheme has a significant improvement in acquisition performance as well as acquisition delay. Furthermore, the number of chips required by this .scheme increases linearly as signal noise rate decreases, which results in much better performance in real-time communication.
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第4期581-588,共8页 Journal of Computer Research and Development
基金 国家自然科学基金重大研究计划项目(90204013) 国家自然科学基金项目(60673082) 上海市科技发展基金项目(035115019) 教育部全国优秀博士学位论文作者专项基金项目(200084)
关键词 快速相关攻击 同步捕获 软判决置信度函数 WALSH变换 fast correlation attack synchronization acquisition soft reliability function Walsh transform
  • 相关文献

参考文献7

  • 1T Siegenthaler.Decrypting a class of stream ciphers using ciphertext only[J].IEEE Trans on Computers,1985,C-34(1):81-85 被引量:1
  • 2T Johansson,F Johansson.Theoretical analysis of a correlation attack based on convolution codes[J].IEEE Trans on Information Theory,2002,48(8):2173-2181 被引量:1
  • 3M Mihanljevic,M Fossorier,H Imai.A low-complexity and high performance algorithm for the fast correlation attack[C].In:Fast Software Encryption (FSE' 2000).New York:Spring-Verlag,2000.196-212 被引量:1
  • 4P Chose,A Joux,M Mittonl.Fast correlation attacks:An algorithmic point of view[C].Int'l Conf on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2002),Amsterdam,The Netherlands,2002 被引量:1
  • 5A Canteaut.Fast correlation attacks against stream ciphers and related open problems[C].2005 IEEE Information Theory Workshop on Theory and Practice in Information Theoretic Security (ITW 2005),Awaji Island,Japan,2005 被引量:1
  • 6L-L Yang,L Hanzo.Acquisition of m-sequences using recursive soft sequential estimation[J].IEEE Trans on Communication,2004,52(2):199-204 被引量:1
  • 7X Y Hu,E Eleftherious,D M Arnold,et al.Efficient implementation of the sum-product algorithm for decoding LDPC codes[C].IEEE Global Telecommunications Conf 2001 (GLOBECOM'01),San Antonio,TX,2001 被引量:1

同被引文献38

  • 1LUPeizhong,LIShen,ZOUYan,LUOXiangyang.Blind recognition of punctured convolutional codes[J].Science in China(Series F),2005,48(4):484-498. 被引量:18
  • 2邹艳,陆佩忠.关键方程的新推广[J].计算机学报,2006,29(5):711-718. 被引量:62
  • 3Lu Pei-zhong, Shen Li, Zou Yan, and Luo Xiang-yang. Blind recognition of punctured convolutional codes[J]. Science in China Ser. F Information Sciences, 2005, 48(4): 484-498. 被引量:1
  • 4Begin G and Haccoun D. High-rate punctured convolutional codes: Structure properties and construction techniques [J]. IEEE Transactions on Communicaitons, 1989, 37(11): 1381-1385. 被引量:1
  • 5Wang Feng-hua, Huang Zhi-tao, and Zhou Yi-yu. A method for blind recognition of convolution code based euclidean algorithmiC].// IEEE International Conference on Wireless Communications. Shanghai: IEEE Press, 2007: 1414-1417. 被引量:1
  • 6刘玉君.信道编码(修订版)[M].郑州:河南科学技术出版社,2001.. 被引量:7
  • 7Polydoros A, Weber C L. A unified approach to serial search spread-spectrum code acquisition-part 1: general theory [ J ]. Communications, IEEE Transactions on, 1984, 32(5): 542-549. 被引量:1
  • 8Chawla K, Sarwate D V. Parallel acquisition of PN se- quences in DS/SS systems [ J]. Communications, IEEE Transactions on, 1994, 42 ( 5 ) : 2155-2164. 被引量:1
  • 9Chugg K M, Zhu M. A new approach to rapid PN cxte ac- quisition using iterative message passing techniques[J]. Se- lected Areas in Communications, IEEE Journal on, 2005, 23(5) : 884-897. 被引量:1
  • 10Siegenthaler T. Decrypting a class of stream ciphers using ciphertext only [ J]. Computers, IEEE Transactions on, 1985, 100(1 ) : 81-85. 被引量:1

引证文献4

二级引证文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部