Application of correlation attack in algorithm identify

被引:0
|
作者
Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
不详 [2 ]
机构
来源
Dianzi Yu Xinxi Xuebao | 2006年 / 5卷 / 827-831期
关键词
Decoding - Normal distribution - Pattern recognition - Statistical methods;
D O I
暂无
中图分类号
学科分类号
摘要
A correlation attack on A5/1 algorithm can be educed by the linear filling weakness in initiate process of A5/1 algorithm. An aberrant A5/1 sequence can be obtained from it, which have treated by statistic tools to get A5/1 statistic trait, so the distinction of A5/1 output from real random sequence can be found. Test results show that this method can work effectively.
引用
收藏
相关论文
共 50 条
  • [31] Improved fast correlation attack using multiple linear approximations and its application on SOSEMANUK
    Ma S.
    Jin C.
    Guan J.
    Cui T.
    Shi Z.
    IEEE Transactions on Information Theory, 2024, 70 (10) : 1 - 1
  • [32] Application of the LMS algorithm to identify the surface velocity responsible for the radiated sound pressure
    Kropp, Wolfgang
    Larsson, Krister
    Lobato, Thiago
    Sottek, Roland
    ACTA ACUSTICA, 2021, 5
  • [33] Correlation fault attack on AES
    Wang X.
    Hu W.
    Tan J.
    Zhu J.
    Tang S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (04): : 192 - 199and208
  • [34] Definition and application of a multi-criteria algorithm to identify landslide acceleration phases
    Valletta, Alessandro
    Carri, Andrea
    Segalini, Andrea
    GEORISK-ASSESSMENT AND MANAGEMENT OF RISK FOR ENGINEERED SYSTEMS AND GEOHAZARDS, 2022, 16 (03) : 555 - 569
  • [35] Privacy-preserving sequential step mining algorithm for multi-step attack correlation
    Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    不详
    Qinghua Daxue Xuebao, 10 (1427-1434):
  • [36] RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection
    Ramaki, Ali Ahmadian
    Amini, Morteza
    Atani, Reza Ebrahimi
    COMPUTERS & SECURITY, 2015, 49 : 206 - 219
  • [37] Algorithm design and application of service-oriented event correlation
    Hanemann, Andreas
    Marcu, Patricia
    2008 3RD IEEE/IFIP INTERNATIONAL WORKSHOP ON BUSINESS-DRIVEN IT MANAGEMENT, 2008, : 61 - +
  • [38] A correlation guided genetic algorithm and its application to feature selection
    Zhou, Jian
    Hua, Zhongsheng
    APPLIED SOFT COMPUTING, 2022, 123
  • [39] Delay correlation subspace decomposition algorithm and its application in fMRI
    Chen, HF
    Yao, DZ
    Chen, WF
    Chen, L
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2005, 24 (12) : 1647 - 1651
  • [40] Adaptive kernelized correlation filter algorithm and application in target tracking
    Yue, Fengfa
    Li, Xingfei
    2017 INTERNATIONAL CONFERENCE ON OPTICAL INSTRUMENTS AND TECHNOLOGY - OPTOELECTRONIC MEASUREMENT TECHNOLOGY AND SYSTEMS, 2017, 10621