Application of Correlation Attack in Algorithm Identify
Chen Wei①; Hu Yun①; Yang Yi-xian①; Niu Xin-xin②
①Information Security Center, Beijing University of Posts & Telecommunications, Beijing 100876, China;②Research Center of Digital Contents, Beijing University of Posts & Telecommunications, Beijing 100876, China
Abstract:A correlation attack on A5/1 algorithm can be educed by the linear filling weakness in initiate process of A5/1 algorithm. An aberrant A5/1 sequence can be obtained from it, which have treated by statistic tools to get A5/1 statistic trait, so the distinction of A5/1 output from real random sequence can be found. Test results show that this method can work effectively.