Algebraic attacks on clock-controlled cascade ciphers

被引:0
|
作者
Wong, Kenneth Koon-Ho [1 ]
Colbert, Bernard [2 ]
Batten, Lynn [2 ]
Al-Hinai, Sultan [1 ]
机构
[1] QUT, ISI, Brisbane, Qld, Australia
[2] Deakin Univ, Melbourne, Vic 3217, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we mount the first algebraic attacks against clock controlled cascade stream ciphers. We first show how to obtain relations between the internal state bits and the output bits of the Gollmann clock controlled cascade stream ciphers. We demonstrate that the initial states of the last two shift registers can be determined by the initial states of the others. An alternative attack on the Gollmann cascade is also described, which requires solving quadratic equations. We then present an algebraic analysis of Pomaranch, one of the phase two proposals to eSTREAM. A system of equations of maximum degree four that describes the full cipher is derived. We also present weaknesses in the filter functions of Pomaranch by successfully computing annihilators and low degree multiples of the functions.
引用
收藏
页码:32 / +
页数:5
相关论文
共 50 条
  • [1] Algebraic attacks on clock-controlled stream ciphers
    Al-Hinai, Sultan
    Batten, Lynn
    Colbert, Bernard
    Wong, Kenneth
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 1 - 16
  • [2] Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers
    Kiyomoto, S
    Tanaka, T
    Sakurai, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (10) : 2778 - 2791
  • [3] Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks
    Al Hinai, Sultan
    Batten, Lynn Margaret
    Colbert, Bernard
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 201 - +
  • [4] The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks
    Choi, Jun
    Moon, Dukjae
    Hong, Seokhie
    Sung, Jaechul
    [J]. ENTROPY, 2015, 17 (06): : 3692 - 3709
  • [5] Edit distance correlation attacks on clock-controlled combiners with memory
    Golic, JD
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 169 - 181
  • [6] Correlation attacks on clock-controlled shift registers in keystream generators
    Golic, JD
    Petrovic, SV
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1996, 45 (04) : 482 - 486
  • [7] Reduced complexity correlation attacks on two clock-controlled generators
    Johansson, T
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 342 - 356
  • [8] Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers
    Caballero-Gil, P
    Fúster-Sabater, A
    [J]. COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2005, 2005, 3643 : 355 - 364
  • [9] Algebraic Attack on the More Generalized Clock-Controlled Alternating Step Generator
    Hassanzadeh, Mehdi M.
    Helleseth, Tor
    [J]. 2010 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS (SPCOM), 2010,
  • [10] Embedding attacks on step[1..D] clock-controlled generators
    Chambers, WG
    Gollmann, D
    [J]. ELECTRONICS LETTERS, 2000, 36 (21) : 1771 - 1773