|
|
Algebraic Attacks on Trivium-Like Stream Ciphers |
SUN Wenlong1,GUAN Jie1 |
(1. Information Engineering University, Zhengzhou 450000, China; 2. Beijing Satellite Navigation Center, Beijing 100094, China) |
|
|
Abstract Trivium stream cipher is one of the finalists of European eSTREAM project. In order to have a better study of the design ideas of Trivium, two revised Trivium algorithms were typically chosen together with Trivium as the targets. The recovery of internal state was converted into the SAT problem to analyze the security of Trivium-like stream ciphers against algebraic attacks. Six guess strategies were tried, and then the equation systems were fed to MiniSat2.0. Finally, some suggestions for the security of Triviumlike stream ciphers against algebraic attack were given according to the results.
|
Received: 04 December 2013
Published: 28 October 2014
|
|
|
|
|
[1] |
SUN Jin1,2,HU Yupu2. Fully Secure Anonymous Identity-Based Broadcast Encryption Scheme[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(07): 1103-1108. |
[2] |
ZHANG Zhongya1,2,GUAN Jie1. Differential Analysis of Stream Cipher Phelix[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(07): 1131-1136. |
[3] |
ZHANG Zhong-Ya, GUAN Jie. Differential Fault Analysis on the Stream Cipher LEX[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(06): 865-869. |
[4] |
GUAN Jie, DING Lin. Slide Attack on Modified Trivium Stream Cipher[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(06): 926-930. |
|
|
|
|