Атаки на потокові шифри, що поєднують статистичні та алгебраїчні методи
DOI:
https://doi.org/10.18372/2410-7840.11.4081Abstract
У статті розглянуто атаки на потокові шифри, у яких статистичні методи, започатковані у 80-х роках, поєднуються з алгебраїчними методами, які активно розробляються в останні роки.References
E.Filiol. A new statistical testing for symmetric ciphers and hash functions.// In Cryptology eprint Archive, Report 2002/099.
M.-J. O.Saarinen. Chosen-IV statistical attacks against eSTREAM ciphers. In SECRYPT
H.Englund, T.Johansson and M.S.Turan. A Framework for chosen IV statistical analysis of stream ciphers.// Advances in cryptology. INDOCRYPT 2007, Lecture Notes in Computer Science, Springer-Verlag. - 2007, pages 268-281, vol. 4859.
S.Fischer, S.Kazaei and W.Meier. Chosen IV statistical analysis for key recovery attacks on stream ciphers.// Advances in cryptology. AFRICACRYPT 2008, Lecture Notes in Computer Science, Springer-Verlag. - 2008, pages 236-245, vol. 5023.
M. Vielhaber. Breaking ONE. FIVIUM by AIDA an algebraic IV differential attack. In Cryptology ePrint Archive, Report 2007/413.
J.-Ph.Aumasson, S.Fischer, S.Khazaei, V/.Meier and C.Rechberger.New features of Latin dances: analysis of Salsa, ChaCha and Rumba.// Fast Software Encryption Lecture Notes in Computer Science, Springer-Verlag. - 2008, pages 470-488, vol. 5086.
I.A.Ajwa, Z.Lin and P.S.Wang. Grobner bases algorithm, ICM Technical Report, Feb. 1995.
J -C.Faugire. A new efficient algorithm for computing Grobner bases (T-4). //Journal of Pure and Applied Algebra.- 1999.- v.139.-P.61-88.
G.Ars, J.-C.Faugire, H.lmai, M.Kavazoe and M.Sugita. Comparison between XL and Grobner basis algorithm. //Advances in cryptology. ASIACRYPT 2004, Lecture Notes in Computer Science, Springer-Verlag. - 2004, pages 338-353, vol. 3329.
N.Courtois and W.Meier. Algebraic attacks on stream ciphers with linear feedback. //Advances in cryptology. EUROCRYPT 2003. Lecture Notes in Computer Science, Springer- Verlag. - 2003, pages 346-359, vol. 2656.
N.Courtois. Fast algebraic attacks on stream ciphers with linear feedback. In Proceedings of CRYPTO 2003, LNCS 2729, 176-194, 2003. Advances in cryptology. CRYPTO 2003. Lecture Notes in Computer Science, Springer-Verlag. - 2003, pages 176-194, vol. 2729.
I.Dinur and A.Shamir. Cube attacks on tweakable black box polynomials. In Cryptology ePrint Archive, Report 2008/385.
S.Arora and S.Safra. Probabilistic checking of proofs: A new characterization of NP. //In Proceedings of 33rd Aim. Symp. On Foundations of Computer Science.- 1992,- P.2-13.
M. Blum, M. Luby and R.Rubinfeid. Self-testing/ correcting with applications to numerical problems. // In Proceedings of 22nd Annual ACM Symp. On Theory of Computing.- 1990,- P. 73-83.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.