Атаки на потокові шифри, що поєднують статистичні та алгебраїчні методи
DOI:
https://doi.org/10.18372/2410-7840.11.4081Abstract
У статті розглянуто атаки на потокові шифри, у яких статистичні методи, започатковані у 80-х роках, поєднуються з алгебраїчними методами, які активно розробляються в останні роки.References
E.Filiol. A new statistical testing for symmetric ciphers and hash functions.// In Cryptology eprint Archive, Report 2002/099.
M.-J. O.Saarinen. Chosen-IV statistical attacks against eSTREAM ciphers. In SECRYPT
H.Englund, T.Johansson and M.S.Turan. A Framework for chosen IV statistical analysis of stream ciphers.// Advances in cryptology. INDOCRYPT 2007, Lecture Notes in Computer Science, Springer-Verlag. - 2007, pages 268-281, vol. 4859.
S.Fischer, S.Kazaei and W.Meier. Chosen IV statistical analysis for key recovery attacks on stream ciphers.// Advances in cryptology. AFRICACRYPT 2008, Lecture Notes in Computer Science, Springer-Verlag. - 2008, pages 236-245, vol. 5023.
M. Vielhaber. Breaking ONE. FIVIUM by AIDA an algebraic IV differential attack. In Cryptology ePrint Archive, Report 2007/413.
J.-Ph.Aumasson, S.Fischer, S.Khazaei, V/.Meier and C.Rechberger.New features of Latin dances: analysis of Salsa, ChaCha and Rumba.// Fast Software Encryption Lecture Notes in Computer Science, Springer-Verlag. - 2008, pages 470-488, vol. 5086.
I.A.Ajwa, Z.Lin and P.S.Wang. Grobner bases algorithm, ICM Technical Report, Feb. 1995.
J -C.Faugire. A new efficient algorithm for computing Grobner bases (T-4). //Journal of Pure and Applied Algebra.- 1999.- v.139.-P.61-88.
G.Ars, J.-C.Faugire, H.lmai, M.Kavazoe and M.Sugita. Comparison between XL and Grobner basis algorithm. //Advances in cryptology. ASIACRYPT 2004, Lecture Notes in Computer Science, Springer-Verlag. - 2004, pages 338-353, vol. 3329.
N.Courtois and W.Meier. Algebraic attacks on stream ciphers with linear feedback. //Advances in cryptology. EUROCRYPT 2003. Lecture Notes in Computer Science, Springer- Verlag. - 2003, pages 346-359, vol. 2656.
N.Courtois. Fast algebraic attacks on stream ciphers with linear feedback. In Proceedings of CRYPTO 2003, LNCS 2729, 176-194, 2003. Advances in cryptology. CRYPTO 2003. Lecture Notes in Computer Science, Springer-Verlag. - 2003, pages 176-194, vol. 2729.
I.Dinur and A.Shamir. Cube attacks on tweakable black box polynomials. In Cryptology ePrint Archive, Report 2008/385.
S.Arora and S.Safra. Probabilistic checking of proofs: A new characterization of NP. //In Proceedings of 33rd Aim. Symp. On Foundations of Computer Science.- 1992,- P.2-13.
M. Blum, M. Luby and R.Rubinfeid. Self-testing/ correcting with applications to numerical problems. // In Proceedings of 22nd Annual ACM Symp. On Theory of Computing.- 1990,- P. 73-83.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).