期刊文献+

A5/1时空折中攻击模型的参数选择研究

The Research of Parameters Selection on the Model of Time-memory-data Trade-off Attack to A5/1
下载PDF
导出
摘要 作为全世界使用最广泛的移动通信系统,全球移动通信系统(GSM)中使用的A5/1加密算法安全性研究有重要的现实意义。该文通过对A5/1算法状态空间缩减性质的分析,描述了基于可变可辨点的多表瘦彩虹表时空折中攻击模型,并给出此模型各个指标的计算公式及确定相关参数的方法。通过利用FPGA硬件平台和参数选择确定,实现了成功率是99%的实时破译计算平均耗时为1 s,从而增加了攻击的现实可用性。此攻击模型的相关参数确定方法对其他平台及限制条件下的攻击实现有一定的参考价值。 GSM is the most popular world-wide standard for mobile communication system. GSM uses A5/1 algorithms to protect the users' information. It is very important to research the attack of A5/1. In this paper, by analyzing the property of the state space' reduction, a model of Time-memory-data trade-off attack to A5/1 algorithms is described, that model based on variable distinguished point and thin rainbow tables. The formulas are derived and the parameters are determined. By using FPGA and parameters determining, the attack success rate exceeds 99% in 1 second on average that improve the practicability of the attack. Based on this model, the method to determine the parameters has reference value to other platform and constraints.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第8期1911-1916,共6页 Journal of Electronics & Information Technology
基金 国家863计划项目(2009AA012201) 上海市科委重大科技攻关项目(08dz501600)资助课题
关键词 时空折中攻击 瘦彩虹表 可变可辨点 成功率 Time-memory-data trade-off attack Thin rainbow table Variable distinguished point Success rate
  • 相关文献

参考文献10

  • 1GSM Association. GSM World-Home of the GSMAssociation. http://www.gsmworld.com/, June 2010. 被引量:1
  • 2Golic J. Cryptanalysis of three mutually clock-controlledstop/go shift registers[J]. IEEE Transactions on InformationTheory, 2000, 46(3): 1081-1090. 被引量:1
  • 3Kumar S, Paar C, Pelzl J, et al.. Breaking ciphers withCOPACOBANAa cost-optimized parallel code breaker[C]. Lecture Notes in Computer Science, 2006, 4249: 101-118. 被引量:1
  • 4Nohl K. Attacking phone privacy. ftp://ftp.trinxp. com/docz/it_tech/blackhat/BlackHat-USA-2010-Nohl-Attacking.Phone. Privacy-wp. pdf, 2010. 被引量:1
  • 5Glendrange M, Hove K, and Hvideberg E. Decoding GSM.http://ntnu.diva-portal.org/smash/get/diva2:355716/FULLTEXT01, June 2010. 被引量:1
  • 6Hamdan A and Bartlett H. State space convergence in theA5/1 keystream generator. http://www.spms.ntu.du.sg/Asiacrypt 2010/Rump, Dec 7th 2010. 被引量:1
  • 7Hellman M E. A cryptanalytic time-memory trade-off [J].IEEE Transactions on Information Theory, 1980, 26(4):401-406. 被引量:1
  • 8Borst J. Block ciphers: design, analysis and side-channelanalysis [D]. [Ph.D. dissertation], Katholieke UniversiteitLeuven, 2001. 被引量:1
  • 9Avoine G, Junod P, and Oechslin P. Time-memory trade-offs:false alarm detection using checkpoints [C]. Lecture Notes inComputer Science, 2005, 3797: 183-196. 被引量:1
  • 10Biryukov A, Shamir A, and Wagner D. Real time cryptanalysis of A5/1 on a PC[C]. Proccedings of Eighth Int'l Workshop Fast Software Encryption (FSE 00), New York, 2001: 1-18. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部