Algebraic attacks on combiners with memory

被引:0
|
作者
Armknecht, F [1 ]
Krause, M [1 ]
机构
[1] Univ Mannheim, D-68131 Mannheim, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k, l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory bits. It is shown that for (k, 1)-combiners, nontrivial canceling relations of degree at most [k(l+1)/2] exist. This makes algebraic attacks possible. Also, a general method is presented to check for such relations with an even lower degree. This allows to show the invulnerability of certain (k, l)-combiners against this kind of algebraic attacks. On the other hand, this can also be used as a tool to find improved algebraic attacks. Inspired by this method, the E-0 keystream generator from the Bluetooth standard is analyzed. As it turns out, a secret key can be recovered by solving a system of linear equations with 2(23.07) unknowns. To our knowledge, this is the best published attack on the Eo keystream generator yet.
引用
收藏
页码:162 / 175
页数:14
相关论文
共 50 条
  • [41] Algebraic attacks using SAT-solvers
    Jovanovic, Philipp
    Kreuzer, Martin
    GROUPS COMPLEXITY CRYPTOLOGY, 2010, 2 (02) : 247 - 259
  • [42] Counting equations in algebraic attacks on block ciphers
    Knudsen, Lars R.
    Miolane, Charlotte V.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (02) : 127 - 135
  • [43] Improved algebraic attacks on lightweight block ciphers
    Sze Ling Yeo
    Duc-Phong Le
    Khoongming Khoo
    Journal of Cryptographic Engineering, 2021, 11 : 1 - 19
  • [44] Algebraic attacks on stream ciphers with linear feedback
    Courtois, NT
    Meier, W
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 345 - 359
  • [45] Resistance of SNOW 2.0 against algebraic attacks
    Billet, O
    Gilbert, H
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 19 - 28
  • [46] Strategies on Algebraic Attacks Using SAT Solvers
    Chen, Baiqiang
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2204 - 2209
  • [47] Algebraic method to recover superpolies in cube attacks
    Ye, Chen-Dong
    Tian, Tian
    IET INFORMATION SECURITY, 2020, 14 (04) : 430 - 441
  • [48] Algebraic Attacks Using Binary Decision Diagrams
    Raddum, Havard
    Kazymyrov, Oleksandr
    CRYPTOGRAPHY AND INFORMATION SECURITY IN THE BALKANS, 2015, 9024 : 40 - 54
  • [49] Attacks on block ciphers of low algebraic degree
    Jakobsen, T
    Knudsen, LR
    JOURNAL OF CRYPTOLOGY, 2001, 14 (03) : 197 - 210
  • [50] Improved algebraic attacks on lightweight block ciphers
    Yeo, Sze Ling
    Le, Duc-Phong
    Khoo, Khoongming
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (01) : 1 - 19