Application of correlation attack in algorithm identify

被引:0
|
作者
Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
不详 [2 ]
机构
来源
Dianzi Yu Xinxi Xuebao | 2006年 / 5卷 / 827-831期
关键词
Decoding - Normal distribution - Pattern recognition - Statistical methods;
D O I
暂无
中图分类号
学科分类号
摘要
A correlation attack on A5/1 algorithm can be educed by the linear filling weakness in initiate process of A5/1 algorithm. An aberrant A5/1 sequence can be obtained from it, which have treated by statistic tools to get A5/1 statistic trait, so the distinction of A5/1 output from real random sequence can be found. Test results show that this method can work effectively.
引用
收藏
相关论文
共 50 条
  • [41] Application of the nonlinear filtering algorithm with a correlation noise in the dynamic positioning
    Lin X.-G.
    Jiao Y.-Z.
    Liang K.
    Li H.
    Jiao, Yu-Zhao (jiaoyuzhao@hrbeu.edu.cn), 1600, South China University of Technology (33): : 1081 - 1088
  • [42] Instantaneous correlation integral algorithm and application in the detection of the line spectrum
    Zhang, Guang-Pu
    Liang, Guo-Long
    Fan, Zhan
    Fu, Jin
    Binggong Xuebao/Acta Armamentarii, 2011, 32 (01): : 69 - 73
  • [43] The use of canonical correlation analysis to identify the order of multivariate ARMA models: Simulation and application
    Toscano, EMM
    Reisen, VA
    JOURNAL OF FORECASTING, 2000, 19 (05) : 441 - 455
  • [44] NBF: An FCA-based Algorithm to Identify Negative Correlation Biclusters of DNA Microarray Data
    Houari, Amina
    Ayadi, Wassim
    Ben Yahia, Sadok
    PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 1003 - 1010
  • [45] A robust whitening algorithm to identify buried objects with similar attributes in correlation-based detection
    Gharamohammadi, Ali
    Shokouhmand, Arash
    JOURNAL OF APPLIED GEOPHYSICS, 2020, 172
  • [46] A New Correlation Model of IoT Attack Based on Attack Tree
    Yu, Liu
    Chen, Kailiang
    Chang, Yue
    Chen, A.
    Yin, Qidi
    Zhang, Hangwei
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 930 - 935
  • [47] Security attack detection algorithm for electric power gis system based on mobile application
    Zhou, Chao
    Feng, Renjun
    Wang, Liming
    Huang, Wei
    Guo, Yajuan
    2017 INTERNATIONAL SYMPOSIUM ON RESOURCE EXPLORATION AND ENVIRONMENTAL SCIENCE (REES 2017), 2017, 64
  • [48] Application of the Deep Learning Algorithm to Identify the Spatial Distribution of Heavy Metals at Contaminated Sites
    Man, Jun
    Zeng, Lingzao
    Luo, Jian
    Gao, Weiliang
    Yao, Yijun
    ACS ES&T ENGINEERING, 2022, 2 (02): : 158 - 168
  • [49] Application of Needleman-Wunch Algorithm to identify mutation in DNA sequences of Corona virus
    Irawani, Mohammad Isa
    Mukhlash, Imam
    Rizky, Abduh
    Dewi, Alfiana Ririsati
    INTERNATIONAL CONFERENCE ON MATHEMATICS: PURE, APPLIED AND COMPUTATION, 2019, 1218
  • [50] Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a
    Zhou, Zhaocun
    Feng, Dengguo
    Zhang, Bin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 322 - 350