Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers

被引:2
|
作者
Zhong, Jianghua [1 ]
Lin, Dongdai [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Nonlinear filter; Stream cipher; Boolean function; Feedback shift register; Computational complexity; DYNAMICS; ATTRACTORS; NETWORKS; GROWTH;
D O I
10.1016/j.jco.2015.12.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nonlinear filter generators are commonly used as keystream generators in stream ciphers. A nonlinear filter generator utilizes a nonlinear filtering function to combine the outputs of a linear feedback shift register (LFSR) to improve the linear complexity of keystream sequences. However, the LFSR-based stream ciphers are still potentially vulnerable to algebraic attacks that recover the key from some keystream bits. Although the known algebraic attacks only require polynomial time complexity of computations, all have their own constraints. This paper uses the linearization of nonlinear filter generators to cryptanalyze LFSR-based stream ciphers. Such a method works for any nonlinear filter generators. Viewing a nonlinear filter generator as a Boolean network that evolves as an automaton through Boolean functions, we first give its linearization representation. Compared to the linearization representation in Limniotis et al. (2008), this representation requires lower spatial complexity of computations in most cases. Based on the representation, the key recoverability is analyzed via the observability of Boolean networks. An algorithm for key recovery is given as well. Compared to the exhaustive search to recover the key, using this linearization representation requires lower time complexity of computations, though it leads to exponential time complexity. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:29 / 45
页数:17
相关论文
共 50 条
  • [1] AN ALGEBRAIC ATTACK ON STREAM CIPHERS WITH APPLICATION TO NONLINEAR FILTER GENERATORS AND WG-PRNG
    Mascia, Carla
    Piccione, Enrico
    Sala, Massimiliano
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (06) : 1710 - 1722
  • [2] Using hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers
    Sosa-Gómez, Guillermo
    Rojas, Omar
    Páez-Osuna, Octavio
    EAI Endorsed Transactions on Energy Web, 2020, 7 (27)
  • [3] Cryptanalysis of MICKEY family of stream ciphers
    Ding, Lin
    Guan, Jie
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 936 - 941
  • [4] Concatenated automata in cryptanalysis of stream ciphers
    Fuster-Sabater, A.
    Caballero-Gil, P.
    CELLULAR AUTOMATA, PROCEEDINGS, 2006, 4173 : 611 - 616
  • [5] Cryptanalysis of stream ciphers with linear masking
    Coppersmith, D
    Halevi, S
    Jutla, C
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 515 - 532
  • [6] Cryptanalysis on stream ciphers for GSM networks
    Hwang, Ren-Junn
    Su, Feng-Fu
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2005, 1 (01) : 30 - 33
  • [7] Cryptanalysis of WG Family of Stream Ciphers
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    Zhang, Shaowu
    Cui, Ting
    Han, Dong
    Zhao, Wei
    COMPUTER JOURNAL, 2015, 58 (10): : 2677 - 2685
  • [8] Deterministic Cryptanalysis of some Stream Ciphers
    Caballero-Gil, P.
    Fuster-Sabater, A.
    Hernandez-Goya, C.
    SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 16 - +
  • [9] Cryptanalysis of the FLIP Family of Stream Ciphers
    Duval, Sebastien
    Lallemand, Virginie
    Rotella, Yann
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 457 - 475
  • [10] Cellular automata application to the linearization of stream cipher generators
    Fúster-Sabater, A
    de la Guía-Martínez, D
    CELLULAR AUTOMATA, PROCEEDINGS, 2004, 3305 : 612 - 621