搜索结果: 1-9 共查到“军事学 Distinguishing Attacks”相关记录9条 . 查询时间(0.093 秒)
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Division property cube attacks MILP Trivium
2019/4/16
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, it is shown to be powerful against Trivium-like ciphers. Traditional cube attacks are experimental att...
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Generalized Feistel cipher Simon's algorithm Grover search,
2019/4/1
A generalized Feistel cipher is one of the methods to construct block ciphers, and it has several variants. Dong, Li, and Wang showed quantum distinguishing attacks against the (2d−1)(2d−1...
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Data Complexity Distinguisher Distinguishing Attack
2015/12/18
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing
attacks on stream ciphers and analyze their inter-relationships. In the process, we formal...
Distinguishing Attacks on RC4 and A New Improvement of the Cipher
secret-key cryptography / RC4 Bias Distinguishing attacks state
2013/4/18
RC4, designed by Rivest in 1987, is the most widely deployed stream cipher in practical applications. In this paper, two new class of statistical biases inherent in RC4 are depicted and it is shown th...
Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words
Distinguishing Attacks Stream Ciphers Pseudo-random Words
2009/9/2
In numerous modern stream ciphers, the internal state consists of
a large array of pseudo-random words, and the output key-stream is
a relatively simple function of the state. In [16], it was heuris...
Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network
Generalized Unbalanced Feistel Network Integral Distinguisher Non-surjective Distinguisher
2009/7/22
Recently, a new kind of Generalized Unbalanced Feistel Net-
work, denoted as GUFN-n, is proposed by Choy et al. at ACISP 2009.
The advantages of this structure are that it allows parallel computatio...
On the Applicability of Distinguishing Attacks Against Stream Ciphers
Distinguishing attack stream cipher
2009/4/15
We demonstrate that the existence of distinguishing attacks against stream ciphers is unrelated to their security in practical use, and in particular that the amount of data required to perform a dist...
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity
NMAC HMAC Distinguishing Attack Birthday Attack
2009/1/5
Kim et al. [4] and Contini et al. [3] studied on the security of
HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1.
Especially, they considered the distinguishing attacks. However, they did
n...
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers
RC4 VMPC RC4A cryptanalysis linear distinguishing attack
2008/9/11
1 At FSE 2004 two new stream ciphers VMPC and RC4A have been proposed.
VMPC is a generalisation of the stream cipher RC4, whereas RC4A is an attempt to increase
the security of RC4 by introducing an...