An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
スポンサーリンク
概要
- 論文の詳細を見る
An algorithm for cryptanalysis of certain keystream generators is proposed. The development algorithm has the following two advantages over other reported ones: it is more powerful, and it can be implemented by a high-speed software or a simple hardware suitable for high parallel architectures. The algorithm is based on error-correction of information bits only (of the corresponding binary block code) with a novel method for construction of the parity-checks, and the employed error-correction procedure is an APP based threshold decoding. Experimental and theoretical analyses of the algorithm performance are presented, and its complexity is evaluated. The proposed algorithm is compared with recently proposed improved fast correlation attacks based on convolutional codes and turbo decoding. The underlying principles, performance and complexity are compared, and the gain obtained with the novel approach is pointed out.
- 社団法人電子情報通信学会の論文
- 2001-01-01
著者
-
Fossorier Marc
ハワイ大学電気工学科
-
Fossorier Marc
University Of Hawaii At Manoa Dept.electrical Engineering Usa.
-
Fossorier M
University Of Hawaii
-
Fossorier Marc
The Author Is With The University Of Hawaii Department Of Electrical Engineering
-
IMAI Hideki
University of Tokyo
-
Fossorier Marc
University Of Hawai At Manoa Dept.of Electrical Engineering
-
MIHALJEVIC Miodrag
The author is with the Mathematical Institute, Serbian Academy of Science and Arts
-
IMAI Hideki
The author is with Institute of Industrial Sience, the University of Tokyo
-
Imai H
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Mihaljevic M
Sony Computer Sci. Lab. Inc. Tokyo Jpn
-
Mihaljevic Miodrag
The Advanced Telecommunication Laboratory Sony Computer Science Laboratories Inc.
-
Fossorier M
Univ. Hawaii Hi Usa
-
Fossorier M
The Author Is With The University Of Hawaii Department Of Electrical Engineering
関連論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- 軟値入出力逐次型限界距離復号法について(モバイル環境におけるPerson to Person高信頼性情報流通技術)(情報通信サブソサイエティ合同研究会)
- 軟値入出力逐次型限界距離復号法について(モバイル環境におけるPerson to person高信頼性情報流通技術 : 情報通信サブソサイエティ合同研究会)
- 軟値入出力逐次型限界距離復号法について(モバイル環境におけるPerson to person高信頼性情報流通技術)(情報通信サブソサイエティ合同研究会)
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- Practical Multilevel Coding and Multistage Decoding for Satellite Broadcasting
- Practical Multilevel Coding and Multistage Decoding for Satellite Broadcasting
- Tradeoffs between Error Performance and Decoding Complexity in Multilevel 8-PSK Codes with UEP Capabilities and Multistage Decoding
- Coded Modulation for Satellite Broadcasting Based on Unconventional Partitionings (Special Section on Information Theory and Its Applications)
- 非対称変調に基づく不均一誤り訂正符号化変調方式の誤り率特性
- 不均一誤り訂正のための3レベルBCH符号化8-PSK変調について
- On Strictly Geometrically Uniform Codes: Construction and New Codes
- On a reduced complexity soft-input and output iterative decoding algorithm for product codes(HISC2006)
- How to Protect Peer-to-Peer Online Games from Cheats
- 2元線型ブロック符号に対する逐次型復号法のテスト系列の選択方法について(ブロードバンドモバイル時代における基礎技術)(情報通信サブソサイエティ合同研究会)
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Iterative Reliability-Based Decoding of Turbo-like Codes
- Multilevel Coded 16-QAM Modulation with Multistage Decoding and Unequal Error Protection
- Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher(Special Section on Cryptography and Information Security)
- A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) (Special Section on Cryptography and Information Security)
- A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time-Variant Table (Special Section on Cryptography and Information Security)
- Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems(Wireless Communication Technology)
- 多値符号化における線形ブロック符号の順序統計量に基づく軟判定復号特性
- Reliability-Based Information Set Decoding of Binary Linear Block Codes (Special Section on Information Theory and Its Applications)
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- 2元線型ブロック符号に対する逐次型復号法のテスト系列の選択方法について(ブロードバンドモバイル時代における基礎技術)(情報通信サブソサイエティ合同研究会)
- 2元線型ブロック符号に対する逐次型復号法のテスト系列の選択方法について(ブロードバンドモバイル時代における基礎技術)(情報通信サブソサイエティ合同研究会)
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- Iterative Reliability-Based Decoding of Turbo-like Codes
- Hierarchical Coding Based on Multilevel Bit-Interleaved Channeles
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- New Short Signature Scheme without Random Oracles
- 位相回転にトランスペアレントなトレリス符号化変調を用いたOFDMにおけるPTS付加情報の伝送
- A Soft-input and output Iterative Decoding Algorithm for Product Codes
- AT-2-2 A Survey on Recent Advances in Broadcast Encryption
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks(Special Issue on Next Generation Internet Technologies and Their Applications)
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- A Comparison between "Most-Reliable-Basis Reprocessing" Strategies(Coding Theory)
- Improved Min-Sum Decoding of Irregular LDPC Codes
- Adaptive Array Antenna Based on Spatial Spectral Estimation Using Maximum Entropy Method (Special Issue on Adaptive Signal Processing in Mobile Radio Communications)
- 符号化OFDMにおけるPTS方式の付加情報伝送について
- OFDMにおけるPTS付加情報の符号化方法の一検討(一般,フレッシュマン,招待講演)
- 位相回転にトランスペアレントなTCMを用いたOFDM信号のピーク対平均電力比削減法
- 位相回転にトランスペアレントなTCMを用いたOFDM信号のピーク対平均電力比削減法
- An Image Correction Scheme for Video Watermarking Extraction : Special Section on Cryptography and Information Security
- Development of Cryptology in the Nineties : Special Section on the 10th Anniversary of Trans. Fundamentals : Last Decade and 21st Century