Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers

被引:2
|
作者
Zhong, Jianghua [1 ]
Lin, Dongdai [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Nonlinear filter; Stream cipher; Boolean function; Feedback shift register; Computational complexity; DYNAMICS; ATTRACTORS; NETWORKS; GROWTH;
D O I
10.1016/j.jco.2015.12.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nonlinear filter generators are commonly used as keystream generators in stream ciphers. A nonlinear filter generator utilizes a nonlinear filtering function to combine the outputs of a linear feedback shift register (LFSR) to improve the linear complexity of keystream sequences. However, the LFSR-based stream ciphers are still potentially vulnerable to algebraic attacks that recover the key from some keystream bits. Although the known algebraic attacks only require polynomial time complexity of computations, all have their own constraints. This paper uses the linearization of nonlinear filter generators to cryptanalyze LFSR-based stream ciphers. Such a method works for any nonlinear filter generators. Viewing a nonlinear filter generator as a Boolean network that evolves as an automaton through Boolean functions, we first give its linearization representation. Compared to the linearization representation in Limniotis et al. (2008), this representation requires lower spatial complexity of computations in most cases. Based on the representation, the key recoverability is analyzed via the observability of Boolean networks. An algorithm for key recovery is given as well. Compared to the exhaustive search to recover the key, using this linearization representation requires lower time complexity of computations, though it leads to exponential time complexity. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:29 / 45
页数:17
相关论文
共 50 条
  • [41] A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers
    Chai, Fengjuan
    Gao, Xiao-Shan
    Yuan, Chunming
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2008, 21 (02) : 191 - 208
  • [42] On the Efficiency of the Probabilistic Neutral Bits Method in Statistical Cryptanalysis of Synchronous Stream Ciphers
    Alekseychuk, A. N.
    Konyushok, S. N.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2016, 52 (04) : 503 - 508
  • [43] Linear and Nonlinear Sequences and Applications to Stream Ciphers
    Helleseth, Tor
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 21 - 45
  • [44] A new simple technique to attack filter generators and related ciphers
    Englund, H
    Johansson, T
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 39 - 53
  • [45] Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems
    Deok Gyu Lee
    Jongsung Kim
    Jaechul Sung
    Yang Sun Lee
    Seungmin Rho
    Telecommunication Systems, 2010, 44 : 297 - 306
  • [46] Nonlinear-Feedback Shift Registers for Stream Ciphers
    Potii, Oleksandr
    Poluyanenko, Nikolay
    Stelnyk, Igor
    Revak, Iryna
    Kavun, Sergii
    Kuznetsova, Tetiana
    2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 906 - 911
  • [47] Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems
    Lee, Deok Gyu
    Kim, Jongsung
    Sung, Jaechul
    Lee, Yang Sun
    Rho, Seungmin
    TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) : 297 - 306
  • [48] Analysis and design of nonlinear combining functions in stream ciphers
    Zhang, Muxiang
    Xiao, Guozhen
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1996, 24 (01): : 48 - 52
  • [49] A new analysis method for nonlinear component of stream ciphers
    Zhao, Y. (zhaoyb1101@yahoo.com.cn), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [50] The filter-combiner model for memoryless synchronous stream ciphers
    Sarkar, P
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 533 - 548