Algebraic attacks on combiners with memory

被引:0
|
作者
Armknecht, F [1 ]
Krause, M [1 ]
机构
[1] Univ Mannheim, D-68131 Mannheim, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k, l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory bits. It is shown that for (k, 1)-combiners, nontrivial canceling relations of degree at most [k(l+1)/2] exist. This makes algebraic attacks possible. Also, a general method is presented to check for such relations with an even lower degree. This allows to show the invulnerability of certain (k, l)-combiners against this kind of algebraic attacks. On the other hand, this can also be used as a tool to find improved algebraic attacks. Inspired by this method, the E-0 keystream generator from the Bluetooth standard is analyzed. As it turns out, a secret key can be recovered by solving a system of linear equations with 2(23.07) unknowns. To our knowledge, this is the best published attack on the Eo keystream generator yet.
引用
收藏
页码:162 / 175
页数:14
相关论文
共 50 条
  • [1] Algebraic attacks on combiners with memory and several outputs
    Courtois, NT
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 3 - 20
  • [2] Fault attacks on combiners with memory
    Armknecht, F
    Meier, W
    SELECTED AREAS IN CRYPTOGRAPHY, 2006, 3897 : 36 - 50
  • [3] Edit distance correlation attacks on clock-controlled combiners with memory
    Golic, JD
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 169 - 181
  • [4] Generic Attacks on Hash Combiners
    Bao, Zhenzhen
    Dinur, Itai
    Guo, Jian
    Leurent, Gaetan
    Wang, Lei
    JOURNAL OF CRYPTOLOGY, 2020, 33 (03) : 742 - 823
  • [5] Generic Attacks on Hash Combiners
    Zhenzhen Bao
    Itai Dinur
    Jian Guo
    Gaëtan Leurent
    Lei Wang
    Journal of Cryptology, 2020, 33 : 742 - 823
  • [6] Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory
    Golic, JD
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (03) : 1032 - 1041
  • [7] Design principles for combiners with memory
    Armknecht, F
    Krause, M
    Stegemann, D
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 104 - 117
  • [8] New Attacks on the Concatenation and XOR Hash Combiners
    Dinur, Itai
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 484 - 508
  • [9] New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting
    Liu, Fukang
    Meier, Willi
    Sarkar, Santanu
    Isobe, Takanori
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (03) : 102 - 122
  • [10] Conditional correlation attack on combiners with memory
    Golic, JD
    ELECTRONICS LETTERS, 1996, 32 (24) : 2193 - 2195