中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 会议论文
Title:
the initialization stage analysis of zuc v1.5
Author: Zhou Chunfang ; Feng Xiutao ; Lin Dongdai
Source: Cryptology and Network Security
Conference Name: Cryptology and Network Security 10th International Conference, CANS 2011
Conference Date: 2011
Issued Date: 2011
Conference Place: Sanya China
Keyword: ZUC – ; initialization – ; chosen ; IV attack – ; differential trail
Indexed Type: SPRINGER ; EI
ISSN: 0302-9743
ISBN: 978-3-642-25512-0
Department: State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Sponsorship: National Natural Science Foundation of China (NSFC); Shandong University (SDU)
Abstract: The ZUC algorithm is a new stream cipher, which is the core of the standardised 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. In this paper, we analyze the initialization stage of ZUC v1.5. First of all, we study the differential properties of operations in ZUC v1.5, including the bit-reorganization, exclusive-or and addition modulo 2 n , bit shift and the update of LFSR. And then we give a differential trail covering 24 rounds of the initialization stage of ZUC v1.5 with probability 2 ? 23.48 , which extends the differential given in the design and evaluation report of ZUC v1.5 to four more rounds. Nevertheless, the study shows that the stream cipher ZUC v1.5 can still resist against chosen-IV attacks.
English Abstract: The ZUC algorithm is a new stream cipher, which is the core of the standardised 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. In this paper, we analyze the initialization stage of ZUC v1.5. First of all, we study the differential properties of operations in ZUC v1.5, including the bit-reorganization, exclusive-or and addition modulo 2 n , bit shift and the update of LFSR. And then we give a differential trail covering 24 rounds of the initialization stage of ZUC v1.5 with probability 2 ? 23.48 , which extends the differential given in the design and evaluation report of ZUC v1.5 to four more rounds. Nevertheless, the study shows that the stream cipher ZUC v1.5 can still resist against chosen-IV attacks.
Language: 英语
Content Type: 会议论文
URI: http://ir.iscas.ac.cn/handle/311060/16233
Appears in Collections:软件所图书馆_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Zhou Chunfang,Feng Xiutao,Lin Dongdai. the initialization stage analysis of zuc v1.5[C]. 见:Cryptology and Network Security 10th International Conference, CANS 2011. Sanya China. 2011.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Zhou Chunfang]'s Articles
[Feng Xiutao]'s Articles
[Lin Dongdai]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Zhou Chunfang]‘s Articles
[Feng Xiutao]‘s Articles
[Lin Dongdai]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace