On Decoding Techniques for Cryptanalysis of Certain Encryption Algorithms(Special Section on Fundamentals of Information and Communications)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, important methods for cryptanalysis of the stream cipher based on a class of keystream generators are discussed. These methods emlploy an approach called the fast correlation attack. This cryptographic problem is treated by considering its equivalent channel coding approach, namely decoding of certain very low rate codes in presence of very high noise. A novel family of algorithms for the fast correlation attack is presented. The algorithms are based on the iterative decoding principle in conjunction with a novel method for constructing the parity-checks. A goal of this paper is to summarize reported results and to compare some of the recent ones. Accordingly, the family is compared with recently proposed improved fast correlation attacks based on iterative decoding methods. An analysis of the algorithms performances and complexities is presented. The corresponding trade-offs between performance, complexity and required inputs are pointed out.
- 社団法人電子情報通信学会の論文
- 2001-04-01
著者
-
IMAI Hideki
The University of Tokyo
-
Mihaljevic M
Serbian Acad. Sci. And Arts Bel
-
MIHALJEVIC Miodrag
the Mathematical Institute, Serbian Academy of Science and Arts
-
FPSSORIER Marc
the University of Tokyo, Institute of Industrial Science
-
Fpssorier Marc
The University Of Tokyo Institute Of Industrial Science
-
Mihaljevic Miodrag
The Mathematical Institute Serbian Academy Of Science And Arts
-
Imai Hideki
The University Of Tokyo Institute Of Industrial Science
-
Imai Hideki
The Univ. Of Tokyo And Concurrently The Research Center For Information Security Of Aist.
関連論文
- CDMA Multi-Cell Performance of Combined Serial Interference Canceller and Normalized Griffiths' Algorithm(Special Issue on Multiple Access and Signal Transmission Techniques for Future Mobile Communications)
- On Decoding Techniques for Cryptanalysis of Certain Encryption Algorithms(Special Section on Fundamentals of Information and Communications)
- On the Hierarchical Structure of Trusted Authority for Unconditionally Secure Cryptography
- A New Hash Function Based on SQH and NH^a
- How to List-up Weak IVs and Weak Keys in WEP : Swap Operations and Weak Patterns