Font Size: a A A

Security Analysis On ZUC And Study Of Cube Attack

Posted on:2014-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:H H DuFull Text:PDF
GTID:2248330398458022Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of information technology,users’ security demand for informationstorage and handling are increasing.In the era of e-government and e-commerce of the21stcentury, a critical problem that people are facing is the information security problem,and thesolution is to use modern cryptographic techniques.Cipher technology is the core of theinformation security technology,which mainly composed by encoding technology andcryptanalysis techniques.The main task of encoding technology is to seek effective cryptographicalgorithms and protocols with high security,in order to meet the requirements for messageencryption or authentication.The main task of cryptanalysis techniques is to decipher thepassword or fake authentication information inorder to steal confidential information or carry outfraud.These two branches are both independent and interdependent.It is precisely because of therelationship of them to promote the development of cryptography itself.Sequence cipher,alsoknown as the stream cipher,is a very important class of cryptosystems which is mainly used forthe vital sectors of the military,the government and others.It’s theoretical and technical termshave been relatively mature.In2004,3GPP launched a study of the long term evolution.The128-EIA3and the128-EEA3involved in the LTE reporting work which were entirely designed by our country.Thecore of the two algorithm is ZUC,which is developed by the DACAS.Currently it has beenadopted as an international standard during the53th three generations Partner Program SystemArchitecture Group meeting on September2011.This is the first international standardindependently developed by China,which is very significant to our country.The Cube Attack is a new method of algebraic attacks proposed by Dinur and Shamir in2009.It absorbed the idea of higher order differential analysis and saturation attack,aimed at thecryptographic algorithm to find low-order equation to recover the key.Cube Attack is a keyrecovery attack,as long as there is an output bit can be expressed as a number of key and initialvector or low-degree multivariate polynomial of plaintext,it can be used to attack any ciphersystem.The Cube Attack is a new kind of stream cipher analysis method.Since ZUC is the first international standard of cryptographic algorithm independentlydeveloped by China,so it becomes a challenging task to carry out security analysis on ZUC;CubeAttack is a currently popular stream cipher analysis method,therefore its promotion hascryptography significance.Around the security analysis of ZUC and the promotion of Cube cipher analysis method,this paper is mainly to do the following work:1. describe ZUC algorithm in detail and depict its existing security analysis.2. refining the core idea of cryptanalysis method Guess and Determine,and use the idea toanalysis ZUC of initialize two steps so that the complexity is reduced to2126.3. lead to the analysis method of stream cipher-Cube cryptanalysis method,introduce itsoriginal attack principle and secondary extension method,give the three promotion on the basisof the second extension.
Keywords/Search Tags:Stream cipher, ZUC, Guess and Determine, Cube cryptanalysis method
PDF Full Text Request
Related items