Font Size: a A A

Algebraic Attack And Its Application

Posted on:2010-03-27Degree:MasterType:Thesis
Country:ChinaCandidate:C LiFull Text:PDF
GTID:2178360272482704Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Recently, a new technique for cryptanalysis, algebraic attack, received a general concern by cryptographists. In this paper, we show the main theory of algebraic attack and its applications both incryptography and cryptanalysis. In the first chapter, we show how the algebraic attack has been proposed and its developments and status quo. In the second chapter, we introduce in brief the theory about algebraic geometry. In the third chapter, we illustrate the XL algorithm, an important algorithm used in algebraic attacks, and it applications in stream cipher. In the forth chapter, we illustrate the triangular list technique include the groebner base method and wu's method. In the last chapter, we introduce the trivium cryptosystem, a submission for the European project eSTREAM. Then we give a cryptanalysis for Trivium with algebraic attack.
Keywords/Search Tags:algebraic attack, XL algorithm, groebner basis, triangular lists, Trivium
PDF Full Text Request
Related items