中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
Weaknesses of cosvd (2,128) stream cipher

文献类型:期刊论文

作者Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Wang, Hong
刊名Information security and cryptology - icisc 2005
出版日期2006
卷号3935页码:270-283
关键词Stream cipher Cos cipher Divide-and-conquer Non-linear feedback shift register
ISSN号0302-9743
通讯作者Zhang, bin(martin_zhangbin@yahoo.com.cn)
英文摘要The cosvd (2,128) cipher was proposed at the ecrypt sasc'2004 workshop by filiol et. al to strengthen the past cos (2,128) stream cipher. it uses clock-controlled non-linear feedback registers filtered by a highly non-linear output function and was claimed to prevent any existing attacks. however, as we will show in this paper, there are some serious security weaknesses in cosvd (2,128). the poorly designed s-box generates biased keystream and the message could be restored by a ciphertext-only attack in some broadcast applications. besides, we launch a divide-and-conquer attack to recover the secret keys from o(2(26))-byte known plaintext with high success rate and complexity o(2(113)), which is much lower than 2(512), the complexity of exhaustive search.
WOS研究方向Computer Science
WOS类目Computer Science, Theory & Methods
语种英语
WOS记录号WOS:000238283000021
出版者SPRINGER-VERLAG BERLIN
URI标识http://www.irgrid.ac.cn/handle/1471x/2378543
专题中国科学院大学
通讯作者Zhang, Bin
作者单位1.Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China
2.Katholieke Univ Leuven, Dept ESAT COSIC, Louvain, Belgium
3.Chinese Acad Sci, State Key Lab Informat Secur, Grad Sch, Beijing 100039, Peoples R China
推荐引用方式
GB/T 7714
Zhang, Bin,Wu, Hongjun,Feng, Dengguo,et al. Weaknesses of cosvd (2,128) stream cipher[J]. Information security and cryptology - icisc 2005,2006,3935:270-283.
APA Zhang, Bin,Wu, Hongjun,Feng, Dengguo,&Wang, Hong.(2006).Weaknesses of cosvd (2,128) stream cipher.Information security and cryptology - icisc 2005,3935,270-283.
MLA Zhang, Bin,et al."Weaknesses of cosvd (2,128) stream cipher".Information security and cryptology - icisc 2005 3935(2006):270-283.

入库方式: iSwitch采集

来源:中国科学院大学

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。