Application of correlation attack in algorithm identify

被引:0
|
作者
Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
不详 [2 ]
机构
来源
Dianzi Yu Xinxi Xuebao | 2006年 / 5卷 / 827-831期
关键词
Decoding - Normal distribution - Pattern recognition - Statistical methods;
D O I
暂无
中图分类号
学科分类号
摘要
A correlation attack on A5/1 algorithm can be educed by the linear filling weakness in initiate process of A5/1 algorithm. An aberrant A5/1 sequence can be obtained from it, which have treated by statistic tools to get A5/1 statistic trait, so the distinction of A5/1 output from real random sequence can be found. Test results show that this method can work effectively.
引用
收藏
相关论文
共 50 条
  • [21] Implementation of eigensystem realization algorithm with data correlation to identify flutter derivatives of bridges
    Li, You-Xiang
    Zhu, Zhi-Wen
    Chen, Zheng-Qing
    Zhendong yu Chongji/Journal of Vibration and Shock, 2008, 27 (08): : 117 - 120
  • [22] An improved genetic algorithm and its application in neural network adversarial attack
    Yang, Dingming
    Yu, Zeyu
    Yuan, Hongqiang
    Cui, Yanrong
    PLOS ONE, 2022, 17 (05):
  • [23] I Sexually Identify as an Attack Helicopter
    Shalloe, Harper
    TSQ-TRANSGENDER STUDIES QUARTERLY, 2019, 6 (04) : 667 - 675
  • [24] Application of Inductive Bayesian Hierarchical Clustering Algorithm to Identify Brain Tumors
    Lurie, Iryna
    Lytvynenko, Volodymyr
    Olszewski, Serge
    Voronenko, Mariia
    Woicik, Waldemar
    Boskin, Oleg
    Zhunissova, Ulzhalgas
    Sherstiuk, Michael
    LECTURE NOTES IN COMPUTATIONAL INTELLIGENCE AND DECISION MAKING (ISDMCI 2020), 2020, 1246 : 567 - 584
  • [25] APPLICATION OF CORRELATION ALGORITHM IN IDS EXPERT KNOWLEDGE BASE
    Ou Yang
    Zheng Zheng
    DCABES 2009: THE 8TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, PROCEEDINGS, 2009, : 242 - 244
  • [26] The conditional correlation attack: A practical attack on bluetooth encryption
    Lu, Y
    Meier, W
    Vaudenay, S
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 97 - 117
  • [27] Attack subplan-based attack scenario correlation
    Chien, Sheng-Hui
    Chang, Erh-Hsien
    Yu, Chih-Yung
    Ho, Cheng-Seen
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 1881 - +
  • [28] MLP-GA based algorithm to detect application layer DDoS attack
    Singh, Khundrakpam Johnson
    De, Tanmay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 : 145 - 153
  • [29] NOVEL PRESENTATION ATTACK DETECTION ALGORITHM FOR FACE RECOGNITION SYSTEM: APPLICATION TO 3D FACE MASK ATTACK
    Raghavendra, R.
    Busch, Christoph
    2014 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2014, : 323 - 327