完整後設資料紀錄
DC 欄位語言
dc.contributor.authorHong, Jun-Chu
dc.contributor.authorTsai, Wen-Nung
dc.contributor.authorChen, Rong-Jaye
dc.date.accessioned2009-06-02T06:19:54Z
dc.date.accessioned2020-05-25T06:39:06Z-
dc.date.available2009-06-02T06:19:54Z
dc.date.available2020-05-25T06:39:06Z-
dc.date.issued2006-10-27T06:11:18Z
dc.date.submitted2000-12-08
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/2683-
dc.description.abstractThe commonest stream cipher system uses a keystream generator which consists of several LFSRs combined by a combining function. If there exists a measure of correlation between the output sequence of the keystream generator and an arbitrary LFSR, the initial state of the LFSR can be reconstructed by a correlation attack, that is, the partial key in the LFSR is determined. W. Meier and O. Staffelbach proposed a correlation attack method using parity check equations. In this paper, we discuss the algorithm and its constraints, and then propose some improvements: computing more low-weight parity check equations, accounting the precise number of relations of each digit, and solving the system of linear independent equations from digits instead of calculating the whole output sequence and the initial state of the LFSR from the relations among the digits.
dc.description.sponsorship中正大學,嘉義縣
dc.format.extent9p.
dc.format.extent148884 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2000 ICS會議
dc.subject.otherTheoretic Foundation
dc.titleA Study on Parity Checks in Stream Cipher Correlation Attacks
分類:2000年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002000000080.pdf145.39 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。