作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2007, Vol. 33 ›› Issue (19): 164-167. doi: 10.3969/j.issn.1000-3428.2007.19.057

• 安全技术 • 上一篇    下一篇

复合混沌伪随机序列加密算法的破译

张 斌,金晨辉   

  1. (信息工程大学电子技术学院,郑州 450004)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-10-05 发布日期:2007-10-05

Breaking Method for Composite Chaotic Pseudo-Random Sequence Encryption Algorithm

ZHANG Bin, JIN Chen-hui   

  1. (Institute of Electronic Technology, University of Information Engineering, Zhengzhou 450004)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-10-05 Published:2007-10-05

摘要: 对复合混沌伪随机序列加密算法(CCPRSEA)做了深入分析,通过对该算法中素域上线性同余变换的分析,分离出混沌序列,利用混沌映射自身的信息泄漏规律,给出基于吻合度分布规律和函数中值定理的分割攻击方法,在base=10, m=3的情况下,证明了破译算法的成功率为0.982 7,计算复杂性为240。实验表明,在主频为2.5GHz的Pentium 4 PC上,求出其全部密钥的整个攻击时间只需8h35min,因此,CCPRSEA是不安全的。

关键词: 混沌密码, 序列密码, 分割攻击, 已知明文攻击, logistics映射, 线性同余变换

Abstract: This paper analyzes the composite chaotic pseudo-random sequence encryption algorithm(CCPRSEA). By analyzing the linear congruent algorithm on a prime field of CCPRSEA, it gains chaotic sequence and gives a tally-degree-based divide-and-conquer attack algorithm by using the information leak of the chaotic map itself. When base=10 and m=3, it proves that the success rate of the attack algorithm is 0.982 7 and the complexity is 240. Experimental results indicate that it just needs 8 hours and 35 minutes for attacking all keys of CCPRSEA in 2.5GHz of Pentium 4 PC. So CCPRSEA is insecure.

Key words: chaotic cipher, stream cipher, divide-and-conquer attack, known plaintexts attack, logistics mapping, linear congruent algorithm

中图分类号: