Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers

被引:2
|
作者
Zhong, Jianghua [1 ]
Lin, Dongdai [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Nonlinear filter; Stream cipher; Boolean function; Feedback shift register; Computational complexity; DYNAMICS; ATTRACTORS; NETWORKS; GROWTH;
D O I
10.1016/j.jco.2015.12.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nonlinear filter generators are commonly used as keystream generators in stream ciphers. A nonlinear filter generator utilizes a nonlinear filtering function to combine the outputs of a linear feedback shift register (LFSR) to improve the linear complexity of keystream sequences. However, the LFSR-based stream ciphers are still potentially vulnerable to algebraic attacks that recover the key from some keystream bits. Although the known algebraic attacks only require polynomial time complexity of computations, all have their own constraints. This paper uses the linearization of nonlinear filter generators to cryptanalyze LFSR-based stream ciphers. Such a method works for any nonlinear filter generators. Viewing a nonlinear filter generator as a Boolean network that evolves as an automaton through Boolean functions, we first give its linearization representation. Compared to the linearization representation in Limniotis et al. (2008), this representation requires lower spatial complexity of computations in most cases. Based on the representation, the key recoverability is analyzed via the observability of Boolean networks. An algorithm for key recovery is given as well. Compared to the exhaustive search to recover the key, using this linearization representation requires lower time complexity of computations, though it leads to exponential time complexity. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:29 / 45
页数:17
相关论文
共 50 条
  • [11] New Cryptanalysis of Irregularly Decimated Stream Ciphers
    Zhang, Bin
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 449 - 465
  • [12] Linear cryptanalysis of the TSC family of stream ciphers
    Muller, F
    Peyrin, T
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 373 - 394
  • [13] Deep Learning based Cryptanalysis of Stream Ciphers
    Mishra, Girish
    Gupta, Indivar
    Murthy, S. V. S. S. N. V. G. Krishna
    Pal, S. K.
    DEFENCE SCIENCE JOURNAL, 2021, 71 (04) : 499 - 506
  • [14] Linearization of stream ciphers by means of concatenated automata
    Fuster-Sabater, A.
    Caballero-Gil, P.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 3, PROCEEDINGS, 2007, 4707 : 544 - +
  • [15] Nonlinear Equivalence of Stream Ciphers
    Ronjom, Sondre
    Cid, Carlos
    FAST SOFTWARE ENCRYPTION, 2010, 6147 : 40 - +
  • [17] New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
    Khazaei, Shahram
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 15 - +
  • [18] Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
    Arroyo, David
    Alvarez, Gonzalo
    Amigo, Jose Maria
    Li, Shujun
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (02) : 805 - 813
  • [19] Cryptanalysis of the energy efficient stream ciphers SSC2
    Liu, Yunyi
    Qin, Tuanfa
    Ni, Wansun
    Zhang, Shuyi
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 144 - 157
  • [20] Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function
    Roy, Dibyendu
    Datta, Pratish
    Mukhopadhyay, Sourav
    JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2015, 49 (1-2) : 397 - 417