基于块内频数检测法对RC4算法产生的伪随机序列检测
The Detection of Pseudo-Random Sequence Generated by RC4 Algorithm Based on Frequency Test within a Block
DOI: 10.12677/SEA.2015.43005, PDF, HTML, XML, 下载: 2,271  浏览: 7,914  国家自然科学基金支持
作者: 陈河源:云南大学软件学院信息安全系,云南 昆明;郑智捷:云南省软件工程重点实验室,云南 昆明
关键词: 序列密码伪随机序列可视化随机性检测Stream Cipher Pseudo-Random Sequence Visualization Randomness Testing
摘要: 序列密码算法的安全性主要取决于算法所产生的伪随机序列的随机性。NIST给出16种伪随机序列检测方法,但它们的适用范围是对选定的一段序列进行检测。如何对大量数据段随机性进行检测还需要系统化探讨。本文结合NIST的伪随机序列检测法辅以可视化方法,并对RC4算法产生的伪随机序列进行随机性检测。通过改变测量参数使可视化的结果更为丰富。通过比较分析,观察到使用不同的密钥长度所得到的图像结果不同,密钥越长特征图像的点聚集程度越高。
Abstract: The security of stream cipher mainly depends on its randomness of pseudo-random sequence. NIST has provided 16 methods for pseudo-random sequence detection, however they are only capable of detecting one selected segment. Hence, the randomness testing method for large numbers of segments needs further systematic research. This paper discussed the detection of pseudo- random sequence generated by the RC4 algorithm. The detection was achieved by combining the NIST detection methods and visual methods. The visualization results became more abundant by changing the parameters. The research result shows that using different key lengths will result in different results and that longer key length will lead to more aggregated image.
文章引用:陈河源, 郑智捷. 基于块内频数检测法对RC4算法产生的伪随机序列检测[J]. 软件工程与应用, 2015, 4(3): 34-43. http://dx.doi.org/10.12677/SEA.2015.43005

参考文献

[1] 刘建夏 (2005) 一种混沌伪随机序列的设计及其应用. 计算机工程, 18, 150-152.
[2] NIST (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf
[3] 张巍琼, 郑智捷 (2012) 基于不同产生机制的伪随机序列和 DNA序列的随机性测量. 成都信息工程学院学报, 6, 文章编号: 1671.
[4] 邓绍江 (2005) 混沌理论及其在信息安全中的应用研究. 博士论文, 重庆大学, 重庆.
[5] 赵伟, 曹云飞 (2013) RC4的密钥碰撞. 通信技术, 12, 74-76.
[6] 朱小兵 (2012) 基于统计随机性的Hash函数安全评估模型研究. 硕士论文, 西南交通大学, 成都.
[7] 周垚 (2013) 基于多维可视化的动态生成序列测量体系. 硕士论文, 云南大学, 昆明
[8] 张美玲 (2010) 密码算法测试平台. 硕士论文, 西安电子科技大学, 西安.
[9] 赵建秀, 王洪国, 邵增珍, 张岳, 丁艳辉 (2013) 一种基于信息熵的时间序列分段线性表示方法. 计算机应用研究, 8, 2391-2394.
[10] 苏桂平, 刘争春, 姚旭初, 殷学文 (2006) 一种信息安全系统中序列随机性检验方法.计算机工程, 8, 210-215.
[11] Zheng, J.Z.J., Zheng, C.H.H. and Kunii, T.L. (2011) A Framework of Variant Logic Construction for Cellular Automata. http://www.intechopen.com/books/cellular-automata-innovative-modelling-for-science-and-engineering/a-framework-of-variant-logic-construction-for-cellular-automata
[12] Zheng, J.Z.J and Zheng, C.H. (2010) A framework to express variant and invariant functional spaces for binary logic. Frontiers of Electrical and Electronic Engineering in China, 5, 163-172.
[13] Li, Q.P. and Zheng, J. (2010) 2D Spatial Distributions for Measures of Random Sequences Using Con-jugate Maps. The 11th Australian Information Warfare and Security Conference, Perth, 30 November-2 December 2010, 18-25.