论文部分内容阅读
对3个新近提出的流密码S1,S2及S3进行了分析.这3个流密码被设计用于GSM网络加密,且分别对应于不同的安全性等级.结果表明,S1和S2都易受已知明文攻击,而S3不能正确解密.只需少量的密文字节和可以忽略的计算量就能够完全破解S1和S2.模拟实验结果表明,S3不能正确工作.结论是这3个流密码要么及其脆弱,要么就是不能正确解密,因此它们并不能在GSM网络安全方面扮演设计者所希望的角色.
Three newly proposed stream ciphers S1, S2 and S3 are analyzed, which are designed for GSM network ciphering and correspond to different security levels respectively. The results show that both S1 and S2 are susceptible to Known plaintext attack, and S3 can not be correctly decrypted.With only a small amount of ciphertext bytes and negligible computation can completely crack S1 and S2. Simulation results show that S3 does not work correctly. The conclusion is that the three stream cipher either Their vulnerability, or their inability to decrypt correctly, does not play a designer’s role in GSM network security.