期刊文献+

SNOW3G与ZUC流密码的猜测决定攻击 被引量:16

Guess and Determine Attack on SNOW3G and ZUC
下载PDF
导出
摘要 SNOW3G流密码算法是3G Partnership Project(3GPP)中实现数据保密性和数据完整性的标准算法UEA2&UIA2的核心,ZUC是3GPP中加密算法128-EEA3和完整性保护算法128-EIA3的核心.至今还没有针对SNOW3G进行猜测决定攻击的研究结果出现.对SNOW3G进行了猜测决定攻击,其计算复杂度为2320,所需数据量为9个32比特密钥字.通过对ZUC算法设计的分析,将ZUC算法中基于32比特字的非线性函数转化为基于16比特半字的非线性函数,提出了基于16比特半字的猜测决定攻击,其计算复杂度为2392,所需数据量为9个32比特密钥字,该结果优于已有的针对ZUC的猜测决定攻击.分析结果表明,尽管ZUC算法的内部状态规模小于SNOW3G,在抵抗猜测决定攻击方面,ZUC明显优于SNOW3G. SNOW3G stream cipher is the core of the standardized 3G Partnership Project (3GPP) confidentiality and integrity algorithms UEA2 & UIA2 while ZUC stream cipher is the core of the standardized 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. So far, there have been no Guess and Determine attacks applied to SNOW3G. In this paper, a Guess and Determine attack on SNOW3G is proposed with a computational complexity of 232~, requiring 9 keystream words (each word consists of 32 bits). After analyzing the design of ZUC, a half-word-based Guess and Determine attack on ZUC is introduced, based on transforming the word-based nonlinear function of ZUC into a half-word-based nonlinear function. The attack on ZUC has a computational complexity of 2392 and requires 9 keystream words, which is better than the previous Guess and Determine attack on ZUC. These results show that ZUC has much better resistance against Guess and Determine attack than SNOW 3G, though the internal state size of ZUC is smaller than SNOW 3G.
出处 《软件学报》 EI CSCD 北大核心 2013年第6期1324-1333,共10页 Journal of Software
基金 国家自然科学基金(61202491 60272041 61272488) 全军军事学研究生课题(2010JY0263-149)
关键词 密码分析 猜测决定攻击 SNOW3G ZUC 3GPP cryptanalysis Guess and Determine attack SNOW3G ZUC 3GPP
  • 相关文献

参考文献1

二级参考文献5

  • 1ETSI/SAGE TS 35.221-2011, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128- EIA3; Document 1:128-EEA3 and 128-EIA3 Specification[S]. 被引量:1
  • 2ETSI/SAGE TS 35.222-2011, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128- EIA3 ; Document 2 : ZUC Specification[S]. 被引量:1
  • 3ETSI/SAGE TS 35.223-2011, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128- EIA3; Document 3: Implementors'test data[S]. 被引量:1
  • 4冯登国,金晨辉,戚文峰,等.一种序列密码实现方法及装置:国际专利,PCT/CN2009/072257[P].2009-06. 被引量:2
  • 5吴文玲,冯秀涛,周春芳.一种S盒构造方法及S盒:国际专利,PCT/CN2010/001048[P].2010-07. 被引量:2

共引文献32

同被引文献77

  • 1陈果,廖晓峰.一种基于混沌映射的图像加密算法[J].计算机应用,2005,25(B12):121-123. 被引量:9
  • 2金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009. 被引量:17
  • 3姜守旭,李建中.一种P2P电子商务系统中基于声誉的信任机制[J].软件学报,2007,18(10):2551-2563. 被引量:103
  • 4茆诗松,王静龙,濮晓龙.高等数理统计[M]高等教育出版社,2006. 被引量:6
  • 5LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms [ J]. IEEE Transactions on Cir- cuits and Systems for Video Technology, 2007, 17(2):214-223. 被引量:1
  • 6STUTZ T, UHL A. A survey of H. 264 AVC/SVC encryption [ J]. Circuits and Systems for Video Technology, 2012, 22( 3):325 - 339. 被引量:1
  • 7WANG L, WANG W, MA J, et al. Perceptual video encryption scheme for mobile application based on H. 264[ J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15:73 -78. 被引量:1
  • 8AU YEUNG S K, ZENG B. A new design of multiple transforms for perceptual video encryption[ C]// Proceedings of the 2012 19th IEEE International Conference on Image Processing. Piscataway: IEEE Press, 2012:2637 -2640. 被引量:1
  • 9AU YEUNG S K, ZENG B. hnproved perceptual video encryption using multiple 8 × 8 transforms in MPEG-4[ C]//Proceedings of the 2012 7th International ICST Conference on Communications and Networking in China. Piscataway: IEEE Press, 2012:185 -188. 被引量:1
  • 10TONG L , DAI F , ZHANG Y . Compressive sensing based video scrambling for privacy protection [ C]// Proceedings of the 2011 IEEE Visual Communications and Image Processing. Piscataway: IEEE Press, 2011:1 -4. 被引量:1

引证文献16

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部