Optimal combined distinguisher of stream cipher with multiple independent distinguishing characters

被引:0
|
作者
机构
[1] Gao, Hai-Ying
[2] Jin, Chen-Hui
来源
Gao, H.-Y. | 1600年 / Editorial Board of Journal on Communications卷 / 33期
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
It is an open problem to combine many distinguishing characters to construct a distinguisher with more advantage. An optimal combined distinguisher based on multiple independent distinguishing characters was proposed. The computing method of distinguishing advantage of this combined distinguisher was presented and the conclusion was given that the data complexity decreased on the condition of same distinguishing advantage, and the distinguishing advantage increased on the condition of the same data complexity when more distinguishing characters were used in distinguishing attack. Let N denote the data complexity of distinguisher with only one character, then the data complexity of combined distinguisher with k-independent characters was about N/k for special case that all distinguishing advantages of k-independent characters were equal.
引用
收藏
相关论文
共 50 条
  • [1] Improved distinguisher for Achterbahn-128 stream cipher
    Li Shunbo
    Huang Guangqiu
    Wang Yan
    Hui Feifei
    Peng Jialong
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2018, 25 (02) : 23 - 27
  • [2] Improved distinguisher for Achterbahn-128 stream cipher
    Shunbo L.
    Guangqiu H.
    Yan W.
    Feifei H.
    Jialong P.
    Journal of China Universities of Posts and Telecommunications, 2018, 25 (02): : 23 - 27
  • [3] Distinguishing attack on the stream cipher Sosemanuk
    Li, Shunbo
    Hu, Yupu
    Wang, Yan
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2012, 33 (02): : 259 - 262
  • [4] Distinguishing attacks on the stream cipher Py
    Paul, Souradyuti
    Preneel, Bart
    Sekar, Gautham
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 405 - 421
  • [5] Distinguishing attack on SN3 stream cipher
    Orumiehchi, Mohammad Ali
    Mohebbipoor, S. Fahimeh
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1392 - 1395
  • [6] Distinguishing attack on stream cipher HC-256'
    Li, S.-B. (shunboli@163.com), 2012, Science Press (34):
  • [7] Multiple differential cryptanalysis based on optimal distinguisher
    Gao, Hai-Ying
    Jin, Chen-Hui
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (04): : 814 - 821
  • [8] A new distinguishing and key recovery attack on NGG stream cipher
    Aleksandar Kircanski
    Rabeah Al-Zaidy
    Amr M. Youssef
    Cryptography and Communications, 2009, 1 : 269 - 282
  • [9] A new distinguishing and key recovery attack on NGG stream cipher
    Kircanski, Aleksandar
    Al-Zaidy, Rabeah
    Youssef, Amr M.
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (02): : 269 - 282
  • [10] Optimal parameters for the WG stream cipher family
    Kalikinkar Mandal
    Guang Gong
    Xinxin Fan
    Mark Aagaard
    Cryptography and Communications, 2014, 6 : 117 - 135