Advanced Search
Volume 30 Issue 10
Jan.  2011
Turn off MathJax
Article Contents
Zhang Bin, Jin Chen-Hui. Inversion Attack Based on Back Tracking Method[J]. Journal of Electronics & Information Technology, 2008, 30(10): 2464-2467. doi: 10.3724/SP.J.1146.2007.00470
Citation: Zhang Bin, Jin Chen-Hui. Inversion Attack Based on Back Tracking Method[J]. Journal of Electronics & Information Technology, 2008, 30(10): 2464-2467. doi: 10.3724/SP.J.1146.2007.00470

Inversion Attack Based on Back Tracking Method

doi: 10.3724/SP.J.1146.2007.00470 cstr: 32379.14.SP.J.1146.2007.00470
  • Received Date: 2007-03-29
  • Rev Recd Date: 2007-09-24
  • Publish Date: 2008-10-19
  • Based on the back tracking method and the correlation between input and output of the feedforward function, a new inversion attack is proposed to the feedforward stream cipher model with a linear feedback shift register based on a multiplication circuit by improving Golics inversion attack. The average computational complexity of back tracking method, and the average computational complexity of the new inversion attack are given. In comparison with Golics algorithm, both the space complexity and the average computational complexity of the new algorithm are less than that of Golics.
  • loading
  • [1] Golic J Dj. On the security of nonlinear filter generators. FastSoftware Encryption, 1996, LNCS Vol.1039: 173-188. [2] Golic J Dj, Clark A, and Dawson Ed. Generalized inversionattack on nonlinear filter generators[J].IEEE Trans. onComputers.2000, 49(10):1100-1108 [3] Golic J Dj, Clark A, and Dawson Ed. Inversion attack andbranching.[J]. ACISP9.1999,LNCS Vol.1587:288- [4] 周培德. 算法设计与分析. 北京: 机械工业出版社, 1996:91-95.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3397) PDF downloads(747) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return