|
|
Application of Correlation Attack in Algorithm Identify |
Chen Wei①; Hu Yun①; Yang Yi-xian①; Niu Xin-xin② |
①Information Security Center, Beijing University of Posts & Telecommunications, Beijing 100876, China;②Research Center of Digital Contents, Beijing University of Posts & Telecommunications, Beijing 100876, China |
|
|
Abstract A correlation attack on A5/1 algorithm can be educed by the linear filling weakness in initiate process of A5/1 algorithm. An aberrant A5/1 sequence can be obtained from it, which have treated by statistic tools to get A5/1 statistic trait, so the distinction of A5/1 output from real random sequence can be found. Test results show that this method can work effectively.
|
Received: 20 December 2004
|
|
|
|
|
|
|
|