On the existence of secure keystream generators

被引:4
|
作者
Klapper, A [1 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40506 USA
关键词
binary sequences; keystream generators; security; cryptography; stream ciphers;
D O I
10.1007/s001450010014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Designers of stream ciphers have generally used ad hoc methods to build systems that are secure against known attacks. There is often a sense that this is the best that can be done, that any system will eventually fall to a practical attack. In this paper we show that there are families of keystream generators that resist all possible attacks of a very general type in which a small number of known bits of a keystream are used to synthesize a generator of the keystream (called a synthesizing algorithm). Such attacks are exemplified by the Berlekamp-Massey attack. We first formalize the notions of a family of finite keystream generators and of a synthesizing algorithm. We then show that for any function h(n) that is in O(2(n/d)) for every d > 0, there is a family a of periodic sequences such that any efficient synthesizing algorithm outputs a generator of size h (log(per(B))) given the required number of bits of a sequence B is an element of B of large enough period. This result is tight in the sense that it fails for any faster growing function h(n). We also consider several variations on this scenario.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [1] On the Existence of Secure Keystream Generators
    Andrew Klapper
    Journal of Cryptology, 2001, 14 : 1 - 15
  • [2] Linear models for keystream generators
    Golic, JD
    IEEE TRANSACTIONS ON COMPUTERS, 1996, 45 (01) : 41 - 49
  • [3] Intrinsic statistical weakness of keystream generators
    Golic, JD
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 91 - 103
  • [4] A New Construction Method for Keystream Generators
    Gul, Cagdas
    Kara, Orhun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3735 - 3744
  • [5] BDD-based cryptanalysis of keystream generators
    Krause, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 222 - 237
  • [6] A family of keystream generators with large linear complexity
    García-Villalba, LJ
    Rodríguez-Palánquex, MC
    APPLIED MATHEMATICS LETTERS, 2001, 14 (05) : 545 - 547
  • [7] Clock-controlled chaotic keystream generators
    Sang, T
    Wang, RL
    Yan, YX
    ELECTRONICS LETTERS, 1998, 34 (20) : 1932 - 1934
  • [8] Algebraic Attacks on Grain-Like Keystream Generators
    Beighton, Matthew
    Bartlett, Harry
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 241 - 270
  • [9] Mutually clock-controlled cipher keystream generators
    Chambers, WG
    Shepherd, SJ
    ELECTRONICS LETTERS, 1997, 33 (12) : 1020 - 1021
  • [10] Global linear complexity analysis of filter keystream generators
    FusterSabater, A
    CaballeroGil, P
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 33 - 38