Algebraic Attacks on Filter and Combiner Generators

被引:0
|
作者
Helleseth, Tor [1 ]
Hojsik, Michal [1 ]
Ronjom, Sondre [1 ]
机构
[1] Univ Bergen, Dept Informat, Selmer Ctr, N-5020 Bergen, Norway
关键词
stream ciphers; filter generator; combiner generator;
D O I
10.3233/978-1-60750-002-5-39
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A short survey of a recent attack on the filter generator due to Ronjom and Helleseth is presented. The attack is generalized to the nonlinear combiner generator. The original attack uses linear combinations of bits in the binary keystream in order to arrive at a linear equation system to be solved for the secret key. Here an argument shows that, when adopting the attack to the nonlinear combiner, then using linear combinations over an extension field is sometimes essential to make the attack work or to reduce the complexity of the attack. Even though a correlation attack may work better for a badly chosen Boolean function used in the combiner generator, the attack presented in this paper does not depend on the Boolean function in the same way and hence can be applied to some correlation-immune combiner generators.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 50 条
  • [21] POWER COMBINER INTEGRATED WITH HARMONIC FILTER.
    Ono, Hiroshi
    Kajiwara, Norio
    Fukuoka, Nobushige
    1980, 34 (01): : 63 - 68
  • [22] On nonlinear filter generators
    Dichtl, M
    FAST SOFTWARE ENCRYPTION, 1997, 1267 : 103 - 106
  • [23] Design of simple wavelength or polarization filter/combiner
    Chen, GZ
    Sala, AL
    Sikorski, Y
    Deck, RT
    Bagley, BG
    FIBER AND INTEGRATED OPTICS, 2005, 24 (01) : 1 - 23
  • [24] Algebraic Attacks on RFID Protocols
    van Deursen, Ton
    Radomirovic, Sasa
    INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 38 - 51
  • [25] Hardware attacks: an algebraic approach
    Moein, Samer
    Gebali, Fayez
    Gulliver, T. Aaron
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (04) : 325 - 337
  • [26] Improving fast algebraic attacks
    Armknecht, Frederik
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3017 : 65 - 82
  • [27] Improving fast algebraic attacks
    Armknecht, F
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 65 - 82
  • [28] Algebraic attacks on cipher systems
    Penzhorn, WT
    2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 969 - 974
  • [29] Algebraic attacks on combiners with memory
    Armknecht, F
    Krause, M
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 162 - 175
  • [30] Algebraic and Slide Attacks on KeeLoq
    Courtois, Nicolas T.
    Bard, Gregory V.
    Wagner, David
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 97 - +