通信学报 ›› 2012, Vol. 33 ›› Issue (11): 185-190.doi: 10.3969/j.issn.1000-436x.2012.11.024

• 学术通信 • 上一篇    

基于E0算法的猜测决定攻击

詹英杰,丁林,关杰   

  1. 信息工程大学 电子技术学院,河南 郑州 450004
  • 出版日期:2012-11-25 发布日期:2017-07-25
  • 基金资助:
    国家自然科学基金资助项目;全军军事学研究生课题基金资助项目

Guess and determine attack on E0algorithm

Ying-jie ZHAN,Lin DING,Jie GUAN   

  1. Electronic Technology Institute,Information Engineering University,Zhengzhou 450004,China
  • Online:2012-11-25 Published:2017-07-25
  • Supported by:
    The National Natural Science Foundation of China;The Military Science Graduate Research Foundation of Army

摘要:

对短距离无线蓝牙技术中使用的E0序列密码算法进行了猜测决定攻击,攻击中利用线性逼近的方法做出了一个巧妙的攻击假设,降低了攻击所需的猜测量,并且通过一个检验方程降低了候选状态的数量,攻击的计算复杂度为O(276),需要约988bit密钥流,属于短密钥流攻击。相对于长密钥流攻击,短密钥流攻击所需的密钥流不超过2 745bit,对E0的安全性更具威胁。与目前已有的针对E0的短密钥流攻击相比,所提出猜测决定的攻击结果是最好的。

关键词: 密码分析, E算法, 猜测决定攻击, 检验方程

Abstract:

A guess and determine attack on E0was presented,the stream cipher that was used in the short-range wireless technology Bluetooth.In the attack,an ingenious assumption by linear approximation to diminish the number of values that have to be guessed was made.Futher more,a test equation to reduce the number of the guessed candidates was used.The guess and determine attack on E0with time complexity of O(276)required about 988 keystream bit.Compared with long keystream attacks,short keystream attacks were more threatening to E0cipher which require less than 2 745 bit.This attack which belongs to short keystream attack was the fastest state recovery attack on E0so far compared with any other existed short keystream attacks.

Key words: cryptanalysis, E0algorithm, guess and determine attack, test equation

No Suggested Reading articles found!