On the use of expansion series for stream ciphers

被引:13
|
作者
Diem, Claus [1 ]
机构
[1] Univ Leipzig, Math Inst, D-04103 Leipzig, Germany
关键词
D O I
10.1112/S146115701200109X
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
From power series expansions of functions on curves over finite fields, one can obtain sequences with perfect or almost perfect linear complexity profile. It has been suggested by various authors to use such sequences as key streams for stream ciphers. In this work, we show how long parts of such sequences can be computed efficiently from short ones. Such sequences should therefore considered to be cryptographically weak. Our attack leads in a natural way to a new measure of the complexity of sequences which we call expansion complexity.
引用
收藏
页码:326 / 340
页数:15
相关论文
共 50 条
  • [1] On the use of Egyptian fractions for stream ciphers
    Cherkaoui, I.
    Zinoun, F.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (01): : 139 - 152
  • [2] STREAM CIPHERS
    PIPER, F
    LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 181 - 188
  • [3] STREAM CIPHERS.
    Piper, Fred
    Elektrotechnik und Maschinenbau, 1987, 104 (12): : 564 - 568
  • [4] Stream ciphers and correlation
    Brincat, K
    Piper, FC
    Wild, PR
    DIFFERENCE SETS, SEQUENCES AND THEIR CORRELATION PROPERTIES, 1999, 542 : 17 - 44
  • [5] Kolmogorov Stream Ciphers
    Scharinger, Josef
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 1 - 8
  • [6] Linear attacks on stream ciphers
    Hell M.
    Johansson T.
    Cryptology and Information Security Series, 2011, 7 : 55 - 85
  • [7] Nonlinear Equivalence of Stream Ciphers
    Ronjom, Sondre
    Cid, Carlos
    FAST SOFTWARE ENCRYPTION, 2010, 6147 : 40 - +
  • [8] Observer Attack on Stream Ciphers
    Anantharaman, Ramachandran
    Sule, Virendra
    IFAC PAPERSONLINE, 2022, 55 (30): : 13 - 18
  • [9] Special Issue on Stream Ciphers
    Maitra, Subhamoy
    Sarkar, Palash
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 145 - 146
  • [10] Correlation attacks on stream ciphers
    Penzhorn, WT
    AFRICON '96 - 1996 IEEE AFRICON : 4TH AFRICON CONFERENCE IN AFRICA, VOLS I & II: ELECTRICAL ENERGY TECHNOLOGY; COMMUNICATION SYSTEMS; HUMAN RESOURCES, 1996, : 1093 - 1098