作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (20): 159-160. doi: 10.3969/j.issn.1000-3428.2010.20.056

• 安全技术 • 上一篇    下一篇

针对流密码MAG算法的已知明文攻击

常亚勤,金晨辉   

  1. (解放军信息工程大学电子技术学院,郑州 450004)
  • 出版日期:2010-10-20 发布日期:2010-10-18
  • 作者简介:常亚勤(1980-),女,博士研究生,主研方向:密码学;金晨辉,教授、博士生导师
  • 基金资助:
    河南省杰出青年科学基金资助项目(0312001800)

Known Plaintext Attack for Stream Cipher MAG Algorithm

CHANG Ya-qin, JIN Chen-hui   

  1. (Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004, China)
  • Online:2010-10-20 Published:2010-10-18

摘要: 基于已知明文的假设下,针对MAG算法初始化、密钥流生成阶段的不同特点,给出2个前向逆推攻击算法。对于密钥规模为 80 bit、128 bit的MAG算法,利用上述2个攻击算法只需已知前128个密钥流输出值,即可恢复其40 bit、32 bit的密钥,计算复杂度为O(214)。模拟结果表明,该方法的平均攻击时间约为9 min,攻击成功率为1。

关键词: MAG算法, 流密码, 已知明文攻击

Abstract: Aiming at the different characteristics of initialization process and the key stream generation of My Array Generator(MAG) algorithm, this paper gives two kinds of forward inversion attack algorithm based on known plaintext assumption. For the 80 bit and 128 bit keys, it can recover 40 bit and 32 bit key respectively with 128 consecutive known key stream byte and the computing complexity O(214). Simulation results show that the average attack time is about 9 min, and the attack success rate is 1.

Key words: My Array Generator(MAG) algorithm, stream cipher, known plaintext attack

中图分类号: