Algebraic Attacks on Filter and Combiner Generators

被引:0
|
作者
Helleseth, Tor [1 ]
Hojsik, Michal [1 ]
Ronjom, Sondre [1 ]
机构
[1] Univ Bergen, Dept Informat, Selmer Ctr, N-5020 Bergen, Norway
关键词
stream ciphers; filter generator; combiner generator;
D O I
10.3233/978-1-60750-002-5-39
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A short survey of a recent attack on the filter generator due to Ronjom and Helleseth is presented. The attack is generalized to the nonlinear combiner generator. The original attack uses linear combinations of bits in the binary keystream in order to arrive at a linear equation system to be solved for the secret key. Here an argument shows that, when adopting the attack to the nonlinear combiner, then using linear combinations over an extension field is sometimes essential to make the attack work or to reduce the complexity of the attack. Even though a correlation attack may work better for a badly chosen Boolean function used in the combiner generator, the attack presented in this paper does not depend on the Boolean function in the same way and hence can be applied to some correlation-immune combiner generators.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 50 条
  • [41] Algebraic attacks over GF(q)
    Batten, LM
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 84 - 91
  • [42] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [43] Algebraic attacks and decomposition of boolean functions
    Meier, W
    Pasalic, E
    Carlet, C
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 474 - 491
  • [44] Improved Attacks on LowMC with Algebraic Techniques
    Sun, Yimeng
    Cui, Jiamin
    Wang, Meiqin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (04) : 143 - 165
  • [45] Dynamic gain equalisation filter based on integrated optical transversal filter with asymmetric combiner
    Saida, T
    Okamoto, K
    Takiguchi, K
    Shibata, T
    ELECTRONICS LETTERS, 2002, 38 (12) : 560 - 561
  • [46] An algebraic construction of quantum flows with unbounded generators
    Belton, Alexander C. R.
    Wills, Stephen J.
    ANNALES DE L INSTITUT HENRI POINCARE-PROBABILITES ET STATISTIQUES, 2015, 51 (01): : 349 - 375
  • [47] An optimised linear attack on pseudorandom generators using a non-linear combiner
    Tanaka, H
    Ohishi, T
    Kaneko, T
    INFORMATION SECURITY, 1998, 1396 : 43 - 54
  • [48] Side channel attacks on irregularly decimated generators
    Loe, Chuan-Wen
    Khoo, Khoongming
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 116 - 130
  • [49] ALGEBRAIC ENTROPY, AUTOMORPHISMS AND SPARSITY OF ALGEBRAIC DYNAMICAL SYSTEMS AND PSEUDORANDOM NUMBER GENERATORS
    Gomez-Perez, Domingo
    Ostafe, Alina
    Shparlinski, Igor
    MATHEMATICS OF COMPUTATION, 2014, 83 (287) : 1535 - 1550
  • [50] Heuristic Attacks Against Graphical Password Generators
    Peach, S.
    Vorster, J.
    van Heerden, R.
    PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 272 - 284