Review of algebraic attacks on stream ciphers

The basic theory and realizing methods of algebraic attacks on stream ciphers are presented.Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations system are described in detail.After analyzing t...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2006-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74666414/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537323161878528
author ZHANG Long1
WU Wen-ling2
WEN Qiao-yan1
author_facet ZHANG Long1
WU Wen-ling2
WEN Qiao-yan1
author_sort ZHANG Long1
collection DOAJ
description The basic theory and realizing methods of algebraic attacks on stream ciphers are presented.Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations system are described in detail.After analyzing the complexity of whole procedures in algebraic attacks,the direction and future works of this research filed are summarized in the end.
format Article
id doaj-art-4f7be2220923429794779482be099705
institution Kabale University
issn 1000-436X
language zho
publishDate 2006-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-4f7be2220923429794779482be0997052025-01-14T08:39:27ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2006-01-01919874666414Review of algebraic attacks on stream ciphersZHANG Long1WU Wen-ling2WEN Qiao-yan1The basic theory and realizing methods of algebraic attacks on stream ciphers are presented.Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations system are described in detail.After analyzing the complexity of whole procedures in algebraic attacks,the direction and future works of this research filed are summarized in the end.http://www.joconline.com.cn/zh/article/74666414/cryptographystream cipherreviewalgebraic attacksXL algorithm
spellingShingle ZHANG Long1
WU Wen-ling2
WEN Qiao-yan1
Review of algebraic attacks on stream ciphers
Tongxin xuebao
cryptography
stream cipher
review
algebraic attacks
XL algorithm
title Review of algebraic attacks on stream ciphers
title_full Review of algebraic attacks on stream ciphers
title_fullStr Review of algebraic attacks on stream ciphers
title_full_unstemmed Review of algebraic attacks on stream ciphers
title_short Review of algebraic attacks on stream ciphers
title_sort review of algebraic attacks on stream ciphers
topic cryptography
stream cipher
review
algebraic attacks
XL algorithm
url http://www.joconline.com.cn/zh/article/74666414/
work_keys_str_mv AT zhanglong1 reviewofalgebraicattacksonstreamciphers
AT wuwenling2 reviewofalgebraicattacksonstreamciphers
AT wenqiaoyan1 reviewofalgebraicattacksonstreamciphers