Rewriting variables: The complexity of fast algebraic attacks on stream ciphers

被引:0
|
作者
Hawkes, P [1 ]
Rose, GG [1 ]
机构
[1] Qualcomm Australia, Gladesville, NSW 2111, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently proposed algebraic attacks [2,6] and fast algebraic attacks [1, 5] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exponential in the degree of the equations. Fast algebraic attacks were introduced [5] as a way of reducing run-time complexity by reducing the degree of the system of equations. Previous reports on fast algebraic attacks [1, 5] have underestimated the complexity of substituting the keystream into the system of equations, which in some cases dominates the attack. We also show how the Fast Fourier Transform (FFT) [4] can be applied to decrease the complexity of the substitution step. Finally, it is shown that all functions of degree d satisfy a common, function-independent linear combination that may be used in the pre-computation step of the fast algebraic attack. An explicit factorization of the corresponding characteristic polynomial yields the fastest known method for performing the pre-computation step.
引用
收藏
页码:390 / 406
页数:17
相关论文
共 50 条
  • [1] Fast algebraic attacks on stream ciphers with linear feedback
    Courtois, NT
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 176 - 194
  • [2] Evaluating the resistance of stream ciphers with linear feedback against fast algebraic attacks
    Braeken, An
    Lano, Joseph
    Preneel, Bart
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 40 - 51
  • [3] Algebraic attacks on stream ciphers with linear feedback
    Courtois, NT
    Meier, W
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 345 - 359
  • [4] FAST CORRELATION ATTACKS ON STREAM CIPHERS
    MEIER, W
    STAFFELBACH, O
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 330 : 301 - 314
  • [5] Combining Algebraic and Side Channel Attacks on Stream Ciphers
    Kazmi, Asif Raza
    Afzal, Mehreen
    Amjad, Muhammad Faisal
    Rashdi, Adnan
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 138 - 142
  • [6] Algebraic attacks on trivium-like stream ciphers
    Guan, Jie, 1600, Shanghai Jiaotong University (48):
  • [7] Algebraic attacks on clock-controlled stream ciphers
    Al-Hinai, Sultan
    Batten, Lynn
    Colbert, Bernard
    Wong, Kenneth
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 1 - 16
  • [8] Stream/block ciphers, difference equations and algebraic attacks
    La Scala, Roberto
    Tiwari, Sharwan K.
    JOURNAL OF SYMBOLIC COMPUTATION, 2022, 109 : 177 - 198
  • [9] Study of Probabilistic Scenarios of Algebraic Attacks on Stream Ciphers
    Pometun, S. A.
    JOURNAL OF AUTOMATION AND INFORMATION SCIENCES, 2009, 41 (02) : 67 - 80
  • [10] Open problems related to algebraic attacks on stream ciphers
    Canteaut, Anne
    CODING AND CRYPTOGRAPHY, 2006, 3969 : 120 - 134