Algebraic Attacks on Filter and Combiner Generators

被引:0
|
作者
Helleseth, Tor [1 ]
Hojsik, Michal [1 ]
Ronjom, Sondre [1 ]
机构
[1] Univ Bergen, Dept Informat, Selmer Ctr, N-5020 Bergen, Norway
关键词
stream ciphers; filter generator; combiner generator;
D O I
10.3233/978-1-60750-002-5-39
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A short survey of a recent attack on the filter generator due to Ronjom and Helleseth is presented. The attack is generalized to the nonlinear combiner generator. The original attack uses linear combinations of bits in the binary keystream in order to arrive at a linear equation system to be solved for the secret key. Here an argument shows that, when adopting the attack to the nonlinear combiner, then using linear combinations over an extension field is sometimes essential to make the attack work or to reduce the complexity of the attack. Even though a correlation attack may work better for a badly chosen Boolean function used in the combiner generator, the attack presented in this paper does not depend on the Boolean function in the same way and hence can be applied to some correlation-immune combiner generators.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 50 条
  • [2] Algebraic attacks on two kinds of special nonlinear filter generators
    Yang, Wenfeng
    Hu, Yupu
    Qiu, Hua
    High Technology Letters, 2012, 18 (02) : 151 - 154
  • [3] Algebraic attacks on summation generators
    Lee, DH
    Kim, JH
    Hong, J
    Han, JW
    Moon, D
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 34 - 48
  • [4] Algebraic Attacks on Grain-Like Keystream Generators
    Beighton, Matthew
    Bartlett, Harry
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 241 - 270
  • [5] Fast correlation attacks on nonlinear filter generators
    Golic, JD
    Salmasizadeh, M
    Simpson, L
    Dawson, E
    INFORMATION PROCESSING LETTERS, 1997, 64 (01) : 37 - 42
  • [6] Fast correlation attacks on nonlinear filter generators
    Information Security Research Centre, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001, Australia
    Inf. Process. Lett., 1 (37-42):
  • [7] Improved inversion attacks on nonlinear filter generators
    Górska, A
    Górski, K
    ELECTRONICS LETTERS, 2002, 38 (16) : 870 - 871
  • [8] Guess and Determine Attacks on Filter Generators-Revisited
    Wei, Yongzhuang
    Pasalic, Enes
    Hu, Yupu
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (04) : 2530 - 2539
  • [9] Attacks Against Filter Generators Exploiting Monomial Mappings
    Canteaut, Anne
    Rotella, Yann
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 78 - 98
  • [10] FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER
    Ma Weiju Feng Dengguo (State Key Laboratory of Information Security
    Journal of Electronics(China), 2006, (06) : 888 - 891