Strengthening of a Graph-Based Cryptanalysis Method

被引:0
作者
Ghasemzadeh, Mohammad [1 ]
Shirmohammadi, Mahsa [1 ]
机构
[1] Yazd Univ, Elect & Comp Dept, Yazd, Iran
来源
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2 | 2009年
关键词
D O I
10.1109/ICCSIT.2009.5234840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
BDD is an efficient data structure that in last few years has been used effectively in computer science and engineering. BDD-based attack in key stream cryptanalysis is supposed to be one of the best forms of attack in its kind. In this paper, we propose a new key stream attack which is based on ZDD(a variant of BDD). We show how our ZDD-based key stream attack can be used against the E(0) type of the Bluetooth security mechanism. We implemented our algorithm using CUDD package. The experimental results witness the superiority of our method. We have also derived a mathematical proof for the algorithm, which shows that its behavior even under the worst circumstances is better than BDD attack.
引用
收藏
页码:118 / 121
页数:4
相关论文
共 11 条
  • [1] BRYANT RE, 1986, IEEE T COMPUT, V35, P677, DOI 10.1109/TC.1986.1676819
  • [2] FLUHRER S, 2001, LNCS, V2259
  • [3] GHASEMZADEH M, 2007, P 12 INT CSI COMP C
  • [4] KRAUSE M, 2002, EUROCRYPT, P222
  • [5] KRAUSE M, 2006, 13 ANN FAST SOFTW EN
  • [6] OBDD-based cryptanalysis of oblivious keystream generators
    Krause, Matthias
    [J]. THEORY OF COMPUTING SYSTEMS, 2007, 40 (01) : 101 - 121
  • [7] Meinel Christoph, 1998, Algorithms and Data Structures in VLSI Design: OBDD-Foundations and Applications
  • [8] MINATO S, P INT J SOFTWARE TOO, P156
  • [9] Robshaw M.J., 1995, Stream ciphers
  • [10] SHAKED Y, LNCS, V4176, P187