Algebraic Attacks on Filter and Combiner Generators

被引:0
|
作者
Helleseth, Tor [1 ]
Hojsik, Michal [1 ]
Ronjom, Sondre [1 ]
机构
[1] Univ Bergen, Dept Informat, Selmer Ctr, N-5020 Bergen, Norway
关键词
stream ciphers; filter generator; combiner generator;
D O I
10.3233/978-1-60750-002-5-39
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A short survey of a recent attack on the filter generator due to Ronjom and Helleseth is presented. The attack is generalized to the nonlinear combiner generator. The original attack uses linear combinations of bits in the binary keystream in order to arrive at a linear equation system to be solved for the secret key. Here an argument shows that, when adopting the attack to the nonlinear combiner, then using linear combinations over an extension field is sometimes essential to make the attack work or to reduce the complexity of the attack. Even though a correlation attack may work better for a badly chosen Boolean function used in the combiner generator, the attack presented in this paper does not depend on the Boolean function in the same way and hence can be applied to some correlation-immune combiner generators.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 50 条
  • [31] Algebraic Collision Attacks on Keccak
    Boissier, Rachelle Heim
    Nous, Camille
    Rotella, Yann
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) : 239 - 268
  • [32] Generators of the ideal of an algebraic space curve
    Fortuna, E.
    Gianni, P.
    Trager, B.
    JOURNAL OF SYMBOLIC COMPUTATION, 2009, 44 (09) : 1234 - 1254
  • [33] Algebraic generators of the skein algebra of a surface
    Santharoubane, Ramanujan
    ALGEBRAIC AND GEOMETRIC TOPOLOGY, 2024, 24 (05):
  • [34] ALGEBRAIC NON-GENERATORS IN SUBSTITUTION
    BOASSON, L
    RAIRO-INFORMATIQUE THEORIQUE ET APPLICATIONS-THEORETICAL INFORMATICS AND APPLICATIONS, 1985, 19 (02): : 125 - 136
  • [35] Revised algorithms for computing algebraic immunity against algebraic and fast algebraic attacks
    Jiao, Lin
    Zhang, Bin
    Wang, Mingsheng
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8783 : 104 - 119
  • [36] Cryptanalytic attacks on pseudorandom number generators
    Kelsey, J
    Schneier, B
    Wagner, D
    Hall, C
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 168 - 188
  • [37] Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited
    Jiao, Lin
    Zhang, Bin
    Wang, Mingsheng
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 169 - 184
  • [38] Protecting Obfuscation against Algebraic Attacks
    Barak, Boaz
    Garg, Sanjam
    Kalai, Yael Tauman
    Paneth, Omer
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 221 - 238
  • [39] Algebraic attacks on the Courtois toy cipher
    Albrecht, Martin
    CRYPTOLOGIA, 2008, 32 (03) : 220 - 276
  • [40] Simplifying algebraic attacks with univariate analysis
    Helleseth, Tor
    Ronjom, Sondre
    2011 Information Theory and Applications Workshop, ITA 2011 - Conference Proceedings, 2011, : 153 - 159