Application of correlation attack in algorithm identify

被引:0
|
作者
Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
不详 [2 ]
机构
来源
Dianzi Yu Xinxi Xuebao | 2006年 / 5卷 / 827-831期
关键词
Decoding - Normal distribution - Pattern recognition - Statistical methods;
D O I
暂无
中图分类号
学科分类号
摘要
A correlation attack on A5/1 algorithm can be educed by the linear filling weakness in initiate process of A5/1 algorithm. An aberrant A5/1 sequence can be obtained from it, which have treated by statistic tools to get A5/1 statistic trait, so the distinction of A5/1 output from real random sequence can be found. Test results show that this method can work effectively.
引用
收藏
相关论文
共 50 条
  • [1] Fast correlation attack algorithm with list decoding and an application
    Mihaljevic, MJ
    Fossorier, MPC
    Imai, H
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 196 - 210
  • [2] A Security Event Correlation Algorithm Based On Attack Sequence
    Zhang Dedong
    Wang Hongwei
    Feng Kailiang
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 81 - 86
  • [3] An Improved Algorithm for Fast Correlation Attack on Stream Ciphers
    Wanzhi Chen
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2126 - 2129
  • [4] A New Alert Correlation Algorithm Based on Attack Graph
    Roschke, Sebastian
    Cheng, Feng
    Meinel, Christoph
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2011, 6694 : 58 - 67
  • [5] Application of adaptive filter in correlation power analysis attack
    Zhang L.
    Fang H.
    Wang J.
    Duan X.
    Fang X.
    Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2018, 39 (02): : 108 - 115
  • [6] Improvement of A5/1 algorithm against correlation attack
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2006, 4 (119-122):
  • [7] Attack Graph Algorithm in the Application of Intrusion Detection System
    Luo Zhiyong
    You Bo
    Xu Jiazhong
    Yu Guixin
    Liu Yahui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
  • [8] The Application of Baum-Welch Algorithm in Multistep Attack
    Zhang, Yanxue
    Zhao, Dongmei
    Liu, Jinxing
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [9] Application of Gaussian Mixture Clustering Algorithm in Template Attack
    Ni, Zhijie
    Ju, Tailiang
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 755 - 759
  • [10] AN ALGORITHM FOR MODERATING DOS ATTACK IN WEB BASED APPLICATION
    Mary, Sophia Navis
    Begum, A. Thasleema
    2017 INTERNATIONAL CONFERENCE ON TECHNICAL ADVANCEMENTS IN COMPUTERS AND COMMUNICATIONS (ICTACC), 2017, : 26 - 31