On the existence of secure keystream generators

被引:4
|
作者
Klapper, A [1 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40506 USA
关键词
binary sequences; keystream generators; security; cryptography; stream ciphers;
D O I
10.1007/s001450010014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Designers of stream ciphers have generally used ad hoc methods to build systems that are secure against known attacks. There is often a sense that this is the best that can be done, that any system will eventually fall to a practical attack. In this paper we show that there are families of keystream generators that resist all possible attacks of a very general type in which a small number of known bits of a keystream are used to synthesize a generator of the keystream (called a synthesizing algorithm). Such attacks are exemplified by the Berlekamp-Massey attack. We first formalize the notions of a family of finite keystream generators and of a synthesizing algorithm. We then show that for any function h(n) that is in O(2(n/d)) for every d > 0, there is a family a of periodic sequences such that any efficient synthesizing algorithm outputs a generator of size h (log(per(B))) given the required number of bits of a sequence B is an element of B of large enough period. This result is tight in the sense that it fails for any faster growing function h(n). We also consider several variations on this scenario.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [21] Indirect Coupled Oscillators for Keystream Generation in Secure Chaotic Communication
    Kharel, Rupak
    Busawon, K.
    Ghassemlooy, Z.
    PROCEEDINGS OF THE 48TH IEEE CONFERENCE ON DECISION AND CONTROL, 2009 HELD JOINTLY WITH THE 2009 28TH CHINESE CONTROL CONFERENCE (CDC/CCC 2009), 2009, : 4099 - 4104
  • [22] CHAOS-BASED FEEDFORWARD OUTPUT FUNCTIONS FOR COMBINING KEYSTREAM GENERATORS
    Sang Tao Wang Ruli Yan Yixun(Optoelectronic Research Center
    Journal of Electronics(China), 2001, (04) : 314 - 320
  • [23] An improved correlation attack against irregular clocked and filtered keystream generators
    Molland, H
    Helleseth, T
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 373 - 389
  • [24] Correlation attacks on clock-controlled shift registers in keystream generators
    Golic, JD
    Petrovic, SV
    IEEE TRANSACTIONS ON COMPUTERS, 1996, 45 (04) : 482 - 486
  • [26] Reducing the space complexity of BDD-based attacks on keystream generators
    Krause, Matthias
    Stegemann, Dirk
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 163 - 178
  • [27] Edit probability correlation attacks on stop/go clocked keystream generators
    Golic, JD
    Menicocci, R
    JOURNAL OF CRYPTOLOGY, 2003, 16 (01) : 41 - 68
  • [28] A Lightweight Keystream Generator Based on Expanded Chaos with a Counter for Secure IoT
    Lee, Tung-Tsun
    Wu, Shyi-Tsong
    ELECTRONICS, 2024, 13 (24):
  • [29] A New Construction Method for Keystream Generators (vol 18, pg 3735, 2023)
    Gul, Cagdas
    Kara, Orhun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4198 - 4198
  • [30] Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection
    Beighton, Matthew
    Bartlett, Harry
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 89 - 108