RC4流密码内部状态重构的元启发式禁忌搜索方法

Bogdan Crainicu, C. Enăchescu
{"title":"RC4流密码内部状态重构的元启发式禁忌搜索方法","authors":"Bogdan Crainicu, C. Enăchescu","doi":"10.1109/ROEDUNET.2011.5993708","DOIUrl":null,"url":null,"abstract":"Because of its simplicity and speed, RC4 is one of the most widely used stream cipher. In this paper we advance a cryptanalytic attack based on Tabu search algorithm which tries to reconstruct the internal state of RC4. Our attack relies on the cryptanalytic algorithm presented by Knudsen et al. in [9], the tree representation of the output word Zt and the tree of general conditions presented by Tomaševic et al. in [21]. Although the results of analitical calculations are slightly better than those given in [9] and [21], the attack remains impractical due to the high complexity.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A metaheuristic tabu search approach for internal state reconstruction of RC4 stream cipher\",\"authors\":\"Bogdan Crainicu, C. Enăchescu\",\"doi\":\"10.1109/ROEDUNET.2011.5993708\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Because of its simplicity and speed, RC4 is one of the most widely used stream cipher. In this paper we advance a cryptanalytic attack based on Tabu search algorithm which tries to reconstruct the internal state of RC4. Our attack relies on the cryptanalytic algorithm presented by Knudsen et al. in [9], the tree representation of the output word Zt and the tree of general conditions presented by Tomaševic et al. in [21]. Although the results of analitical calculations are slightly better than those given in [9] and [21], the attack remains impractical due to the high complexity.\",\"PeriodicalId\":277269,\"journal\":{\"name\":\"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ROEDUNET.2011.5993708\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ROEDUNET.2011.5993708","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

由于其简单和速度快,RC4是使用最广泛的流密码之一。本文提出了一种基于禁忌搜索算法的密码分析攻击,该算法试图重构RC4的内部状态。我们的攻击依赖于Knudsen等人在[9]中提出的密码分析算法,输出词Zt的树表示和Tomaševic等人在[21]中提出的一般条件树。虽然解析计算的结果略好于[9]和[21]给出的结果,但由于攻击的高复杂性,仍然不切实际。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A metaheuristic tabu search approach for internal state reconstruction of RC4 stream cipher
Because of its simplicity and speed, RC4 is one of the most widely used stream cipher. In this paper we advance a cryptanalytic attack based on Tabu search algorithm which tries to reconstruct the internal state of RC4. Our attack relies on the cryptanalytic algorithm presented by Knudsen et al. in [9], the tree representation of the output word Zt and the tree of general conditions presented by Tomaševic et al. in [21]. Although the results of analitical calculations are slightly better than those given in [9] and [21], the attack remains impractical due to the high complexity.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Computer aided learning with GRID technologies Computer aided education. IT for children with disabilities GNU GPL in studying programs from the Systems Engineering field Open courseware initiatives - after 10 years MoodleDrive Cloud storage implemented using Moodle 2.0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1