Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers

被引:2
|
作者
Zhong, Jianghua [1 ]
Lin, Dongdai [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Nonlinear filter; Stream cipher; Boolean function; Feedback shift register; Computational complexity; DYNAMICS; ATTRACTORS; NETWORKS; GROWTH;
D O I
10.1016/j.jco.2015.12.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nonlinear filter generators are commonly used as keystream generators in stream ciphers. A nonlinear filter generator utilizes a nonlinear filtering function to combine the outputs of a linear feedback shift register (LFSR) to improve the linear complexity of keystream sequences. However, the LFSR-based stream ciphers are still potentially vulnerable to algebraic attacks that recover the key from some keystream bits. Although the known algebraic attacks only require polynomial time complexity of computations, all have their own constraints. This paper uses the linearization of nonlinear filter generators to cryptanalyze LFSR-based stream ciphers. Such a method works for any nonlinear filter generators. Viewing a nonlinear filter generator as a Boolean network that evolves as an automaton through Boolean functions, we first give its linearization representation. Compared to the linearization representation in Limniotis et al. (2008), this representation requires lower spatial complexity of computations in most cases. Based on the representation, the key recoverability is analyzed via the observability of Boolean networks. An algorithm for key recovery is given as well. Compared to the exhaustive search to recover the key, using this linearization representation requires lower time complexity of computations, though it leads to exponential time complexity. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:29 / 45
页数:17
相关论文
共 50 条
  • [21] Security of jump controlled sequence generators for stream ciphers
    Helleseth, Tor
    Jansen, Cees J. A.
    Khazaei, Shahram
    Kholosha, Alexander
    SEQUENCES AND THEIR APPLICATIONS - SETA 2006, 2006, 4086 : 141 - 152
  • [22] Cryptanalysis of WG-8 and WG-16 stream ciphers
    Rostami, Saeed
    Shakour, Elham
    Orumiehchiha, Mohammad Ali
    Pieprzyk, Josef
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (02): : 351 - 362
  • [23] Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy
    Wu, Hongjun
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 276 - +
  • [24] Cryptanalysis of WG-8 and WG-16 stream ciphers
    Saeed Rostami
    Elham Shakour
    Mohammad Ali Orumiehchiha
    Josef Pieprzyk
    Cryptography and Communications, 2019, 11 : 351 - 362
  • [25] A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter
    Zhong, Xiao
    Wang, Mingsheng
    Zhang, Bin
    Wu, Shengbao
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 132 - 142
  • [26] Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
    Canales-Martinez, Isaac A.
    Semaev, Igor
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (11) : 3391 - 3427
  • [27] Application of input — State of the system transformation for linearization of some nonlinear generators
    Andrzej Zawadzki
    Sebastian Różowicz
    International Journal of Control, Automation and Systems, 2015, 13 : 626 - 633
  • [28] Application of Input - State of the System Transformation for Linearization of Some Nonlinear Generators
    Zawadzki, Andrzej
    Rozowicz, Sebastian
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2015, 13 (03) : 626 - 633
  • [29] Linear cryptanalysis of non binary ciphers (with an application to SAFER)
    Baigneres, Thomas
    Stern, Jacques
    Vaudenay, Serge
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 184 - +
  • [30] Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection
    Stone, William
    Kim, Daeyoung
    Kemmoe, Victor Youdom
    Kang, Mingon
    Son, Junggab
    IEEE ACCESS, 2020, 8 (08): : 191602 - 191616