Cryptanalysis of the Vesta-2M stream cipher
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O. The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2003-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74360861/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841538960526934016 |
---|---|
author | GUAN Jie |
author_facet | GUAN Jie |
author_sort | GUAN Jie |
collection | DOAJ |
description | The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O. The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method where only a small segment of known plaintext(about hundreds of bits) , the upper bound of the compute complexity is)2(372O. |
format | Article |
id | doaj-art-38f60c83b42b449ca0332457b6e28bda |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2003-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-38f60c83b42b449ca0332457b6e28bda2025-01-14T07:29:44ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2003-01-0115015474360861Cryptanalysis of the Vesta-2M stream cipherGUAN JieThe security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O. The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method where only a small segment of known plaintext(about hundreds of bits) , the upper bound of the compute complexity is)2(372O.http://www.joconline.com.cn/zh/article/74360861/Vesta-2Mstream ciphercryptanalysis |
spellingShingle | GUAN Jie Cryptanalysis of the Vesta-2M stream cipher Tongxin xuebao Vesta-2M stream cipher cryptanalysis |
title | Cryptanalysis of the Vesta-2M stream cipher |
title_full | Cryptanalysis of the Vesta-2M stream cipher |
title_fullStr | Cryptanalysis of the Vesta-2M stream cipher |
title_full_unstemmed | Cryptanalysis of the Vesta-2M stream cipher |
title_short | Cryptanalysis of the Vesta-2M stream cipher |
title_sort | cryptanalysis of the vesta 2m stream cipher |
topic | Vesta-2M stream cipher cryptanalysis |
url | http://www.joconline.com.cn/zh/article/74360861/ |
work_keys_str_mv | AT guanjie cryptanalysisofthevesta2mstreamcipher |