Algebraic attacks on combiners with memory

被引:0
|
作者
Armknecht, F [1 ]
Krause, M [1 ]
机构
[1] Univ Mannheim, D-68131 Mannheim, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k, l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory bits. It is shown that for (k, 1)-combiners, nontrivial canceling relations of degree at most [k(l+1)/2] exist. This makes algebraic attacks possible. Also, a general method is presented to check for such relations with an even lower degree. This allows to show the invulnerability of certain (k, l)-combiners against this kind of algebraic attacks. On the other hand, this can also be used as a tool to find improved algebraic attacks. Inspired by this method, the E-0 keystream generator from the Bluetooth standard is analyzed. As it turns out, a secret key can be recovered by solving a system of linear equations with 2(23.07) unknowns. To our knowledge, this is the best published attack on the Eo keystream generator yet.
引用
收藏
页码:162 / 175
页数:14
相关论文
共 50 条
  • [31] Algebraic attacks on the Courtois toy cipher
    Albrecht, Martin
    CRYPTOLOGIA, 2008, 32 (03) : 220 - 276
  • [32] Simplifying algebraic attacks with univariate analysis
    Helleseth, Tor
    Ronjom, Sondre
    2011 Information Theory and Applications Workshop, ITA 2011 - Conference Proceedings, 2011, : 153 - 159
  • [33] Algebraic attacks over GF(q)
    Batten, LM
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 84 - 91
  • [34] Algebraic Attacks on Filter and Combiner Generators
    Helleseth, Tor
    Hojsik, Michal
    Ronjom, Sondre
    ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 : 39 - 48
  • [35] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [36] Algebraic attacks and decomposition of boolean functions
    Meier, W
    Pasalic, E
    Carlet, C
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 474 - 491
  • [37] Improved Attacks on LowMC with Algebraic Techniques
    Sun, Yimeng
    Cui, Jiamin
    Wang, Meiqin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (04) : 143 - 165
  • [38] Feedback shift registers, 2-adic span, and combiners with memory
    Klapper, A
    Goresky, M
    JOURNAL OF CRYPTOLOGY, 1997, 10 (02) : 111 - 147
  • [39] Feedback shift registers, 2-adic span, and combiners with memory
    Andrew Klapper
    Mark Goresky
    Journal of Cryptology, 1997, 10 : 111 - 147
  • [40] Algebraic Attacks Using IP-Solvers
    Ullah, Ehsan
    COMPUTER ALGEBRA IN SCIENTIFIC COMPUTING, CASC 2013, 2013, 8136 : 401 - 411