کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
1136472 | 1489150 | 2012 | 11 صفحه PDF | دانلود رایگان |
عنوان انگلیسی مقاله ISI
Related key chosen IV attacks on Decim v2 and Decim-128
دانلود مقاله + سفارش ترجمه
دانلود مقاله ISI انگلیسی
رایگان برای ایرانیان
موضوعات مرتبط
مهندسی و علوم پایه
سایر رشته های مهندسی
کنترل و سیستم های مهندسی
پیش نمایش صفحه اول مقاله
چکیده انگلیسی
The Decim v1 is a hardware oriented stream cipher that was proposed by Berbain et al. and has been submitted to eSTREAM. Decim v2 is a revised version of Decim v1 and was submitted to ISO/IEC 18033-4. Decim-128 is a 128-bit security version of Decim. In this paper, we propose related key chosen IV attacks on Decim v2 and Decim-128. The attacks on Decim v2 and Decim-128 can recover the 80-bit and 128-bit secret keys with computational complexity of 268/296, requiring 220/251 chosen IVs, 226/256.88-bit stream sequence and negligible/ 242.58 bits space, respectively. When more than 8 and 10 related keys can be obtained for Decim v2 and Decim-128, the computational complexity can be reduced to 232/238, requiring 223/233.32 chosen IVs, 229/239.25-bit stream sequence and negligible/ 230.91 bits space, respectively. These results have been the best key recovery attacks on Decim v2 and Decim-128.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Mathematical and Computer Modelling - Volume 55, Issues 1â2, January 2012, Pages 123-133
Journal: Mathematical and Computer Modelling - Volume 55, Issues 1â2, January 2012, Pages 123-133
نویسندگان
Ding Lin, Guan Jie,