作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (9): 129-130,. doi: 10.3969/j.issn.1000-3428.2010.09.044

• 安全技术 • 上一篇    下一篇

基于选择差分的Trivium猜测攻击

孙国平,胡予濮,白生江   

  1. (西安电子科技大学计算机网络与信息安全教育部重点实验室,西安 710071)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2010-05-05 发布日期:2010-05-05

Guess Attack on Trivium Based on Chosen Differential

SUN Guo-ping, HU Yu-pu, BAI Sheng-jiang   

  1. (Key Laboratory of Computer Network and Information Security of Ministry of Education, Xidian University, Xi’an 710071)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-05-05 Published:2010-05-05

摘要: 给出一种基于选择差分对Trivium算法进行猜测攻击的方法。通过分析Trivium密钥流生成方程,确定需要改变Trivium 288 bit内部状态中的52 bit,使用错误注入改变所确定的52 bit,并生成密钥流,与原始密钥流进行差分。该方法只需猜测45 bit即可使密钥流生成方程中的177个非线性方程成为线性方程,加上已有的66个线性方程,使用高斯消元法获得剩余的243 bit,从而攻破Trivium。

关键词: Trivium算法, 选择差分攻击, 猜测攻击

Abstract: This paper proposes a guess attack method on Trivium based on chosen differential. By analyzing the key generation equations of Trivium and determining 52 bit of its interior state which need to be altered, and then fault injections are used to alter these 52 bit and a faulty key stream can be obtained. The difference between the faulty key stream and the original key stream is computed, so that it only need guess 45 bit to make 177 nonlinear equations of key stream generation equations become linear equations. With the addition of 66 original linear equations, the rest 243 bit can be obtained by gauss elimination, thus Trivium is broken.

Key words: Trivium, chosen differential attack, guess attack

中图分类号: