An Improved Fast Correlation Attack on Stream Ciphers

被引:0
|
作者
Zhang, Bin [1 ]
Feng, Dengguo [2 ]
机构
[1] Univ Luxembourg, Lab Algorithm Cryptol & Secur, 6 Rue Coudenhove Kalergi, L-1359 Luxembourg, Luxembourg
[2] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100190, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Stream ciphers; Correlation attacks; Linear feedback shift register (LFSR); Shrinking generator; SHRINKING GENERATOR;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At Crypto'2000, Johansson and Jonsson proposed a fast correlation attack on stream ciphers based on the Coldreich-Rubinfeld-Sudan algorithm. In this paper we show that a combination of their approach with techniques for substituting keystream and evaluating parity-checks gives us the most efficient fast correlation attack known so far. An application of the new algorithm results in the first-known near-practical key recovery attack on the shrinking generator with the parameters suggested by Krawczyk in 1994, which was verified in the 40-bit data LFSR case for which the only previously known efficient attacks were distinguishing attacks.
引用
收藏
页码:214 / +
页数:3
相关论文
共 50 条
  • [31] Another Tradeoff Attack on Sprout-Like Stream Ciphers
    Zhang, Bin
    Gong, Xinxin
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 561 - 585
  • [32] Fast correlation attack on stream cipher ABC v3
    HaiNa Zhang
    Lin Li
    XiaoYun Wang
    [J]. Science in China Series F: Information Sciences, 2008, 51 : 936 - 947
  • [33] Internal State Recovery Attack on Stream Ciphers: Breaking BIVIUM
    Shahapure, Shravani
    Sule, Virendra
    Daruwala, R. D.
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 34 - 49
  • [34] New Key Recovery Attack on the MICKEY Family of Stream Ciphers
    Ding, Lin
    Gu, Dawu
    Wang, Lei
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 239 - 249
  • [35] Cube Attack on Stream Ciphers using a Modified Linearity Test
    Srinivasan, Chungath
    Pillai, Utkarsh Umesan
    Lakshmy, K. V.
    Sethumadhavan, M.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 301 - 311
  • [36] Cube Attack on Trivium and A5/1 Stream Ciphers
    Islam, Saad
    Ul Hag, Inam
    [J]. 2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 409 - 415
  • [37] Improved fast correlation attack using low rate codes
    Molland, H
    Mathiassen, JE
    Helleseth, T
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 67 - 81
  • [38] CORRELATION-PROPERTIES OF COMBINERS WITH MEMORY IN STREAM CIPHERS
    MEIER, W
    STAFFELBACH, O
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 204 - 213
  • [39] Fast algebraic attacks on stream ciphers with linear feedback
    Courtois, NT
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 176 - 194
  • [40] Fast Discrete Fourier Spectra Attacks on Stream Ciphers
    Gong, Guang
    Ronjom, Sondre
    Helleseth, Tor
    Hu, Honggang
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) : 5555 - 5565