搜索结果: 1-7 共查到“密码学 Grain v1”相关记录7条 . 查询时间(0.083 秒)
Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1
Fast correlation attack Stream cipher LFSR
2018/6/5
A fast correlation attack (FCA) is a well-known cryptanalysis technique for LFSR-based stream ciphers. The correlation between the initial state of an LFSR and corresponding key stream is exploited, a...
Fast Near Collision Attack on the Grain v1 Stream Cipher
Cryptanalysis Stream ciphers Grain
2018/2/9
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks. In this ...
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Differential Fault Attack Stream Cipher Grain v1
2017/7/14
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a stream cipher. This considers that the stream cipher can be weakened by injection of the fault. In th...
A Dynamic Cube Attack on $105$ round Grain v1
eStream Differential Cryptanalysis Dynamic Cube Attack
2016/1/7
As far as the Differential Cryptanalysis of reduced round Grain
v1 is concerned, the best results were those published by Knellwolf et al. in
Asiacrypt 2011. In an extended version of the paper, it ...
A New Distinguisher on Grain v1 for 106 rounds
Differential Cryptanalysis Distinguisher Grain v1
2015/12/31
In Asiacrypt 2010, Knellwolf, Meier and Naya-Plasencia proposed
distinguishing attacks on Grain v1 when (i) Key Scheduling process
is reduced to 97 rounds using 227 chosen IVs and (ii) Key Schedulin...
The crucial problem of cube attack is the selection of cube set, which also being the most time-consuming process. This paper designs a new search algorithm which generates several linear equations th...
This article aims to present dynamic cube attack on Grain-v1. Dynamic cube attack finds the secret key by using distinguishers gained from structural weakness. The main idea of dynamic cube attack lie...