Algebraic attacks on combiners with memory

被引:0
|
作者
Armknecht, F [1 ]
Krause, M [1 ]
机构
[1] Univ Mannheim, D-68131 Mannheim, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k, l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory bits. It is shown that for (k, 1)-combiners, nontrivial canceling relations of degree at most [k(l+1)/2] exist. This makes algebraic attacks possible. Also, a general method is presented to check for such relations with an even lower degree. This allows to show the invulnerability of certain (k, l)-combiners against this kind of algebraic attacks. On the other hand, this can also be used as a tool to find improved algebraic attacks. Inspired by this method, the E-0 keystream generator from the Bluetooth standard is analyzed. As it turns out, a secret key can be recovered by solving a system of linear equations with 2(23.07) unknowns. To our knowledge, this is the best published attack on the Eo keystream generator yet.
引用
收藏
页码:162 / 175
页数:14
相关论文
共 50 条
  • [21] CORRELATION-PROPERTIES OF COMBINERS WITH MEMORY IN STREAM CIPHERS
    MEIER, W
    STAFFELBACH, O
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 204 - 213
  • [22] Algebraic attacks on summation generators
    Lee, DH
    Kim, JH
    Hong, J
    Han, JW
    Moon, D
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 34 - 48
  • [23] Improving fast algebraic attacks
    Armknecht, Frederik
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3017 : 65 - 82
  • [24] Improving fast algebraic attacks
    Armknecht, F
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 65 - 82
  • [25] Algebraic attacks on cipher systems
    Penzhorn, WT
    2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 969 - 974
  • [26] Algebraic and Slide Attacks on KeeLoq
    Courtois, Nicolas T.
    Bard, Gregory V.
    Wagner, David
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 97 - +
  • [27] Algebraic Collision Attacks on Keccak
    Boissier, Rachelle Heim
    Nous, Camille
    Rotella, Yann
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) : 239 - 268
  • [28] Revised algorithms for computing algebraic immunity against algebraic and fast algebraic attacks
    Jiao, Lin
    Zhang, Bin
    Wang, Mingsheng
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8783 : 104 - 119
  • [29] Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited
    Jiao, Lin
    Zhang, Bin
    Wang, Mingsheng
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 169 - 184
  • [30] Protecting Obfuscation against Algebraic Attacks
    Barak, Boaz
    Garg, Sanjam
    Kalai, Yael Tauman
    Paneth, Omer
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 221 - 238