A Fast Correlation Attack for LFSR-Based Stream Ciphers

作者: Sarbani Palit , Bimal K. Roy , Arindom De

DOI: 10.1007/978-3-540-45203-4_26

关键词: Hamming weightCorrelation function (quantum field theory)Iterative methodCiphertextCorrelation attackAlgorithmStream cipherLinear systemHamming distanceMathematics

摘要: This paper describes a novel fast correlation attack of stream ciphers. The salient feature the algorithm is absence any pre-processing or iterative phase, an usual existing attacks. attempts to identify number bits original linear feedback shift register (LFSR) output from received ciphertext. These are then used construct system equations which subsequently solved obtain initial conditions. found perform well for LFSRs large sizes but having sparse polynomials. It may be noted that such polynomials have low Hamming weight one more than connections “taps” corresponding LFSR. Its performance good in situations even where limited cipherlength available. Another important contribution modification approach when LFSR outputs combined by function immune and perhaps, unknown decrypter.

参考文章(19)
Lennart Brynielsson, A short proof of the Xiao-Massey lemma IEEE Transactions on Information Theory. ,vol. 35, pp. 1344- ,(1989)
Miodrag J. Mihaljevi, Marc P. C. Fossorier, Hideki Imai, Fast Correlation Attack Algorithm with List Decoding and an Application fast software encryption. pp. 196- 210 ,(2001) , 10.1007/3-540-45473-X_17
Kencheng Zeng, Minqiang Hung, On the Linear Syndrome Method in Cryptoanalysis international cryptology conference. ,vol. 403, pp. 469- 478 ,(1988) , 10.1007/0-387-34799-2_32
Réjane Forré, A fast correlation attack on nonlinearly feedforward filtered shift-register sequences theory and application of cryptographic techniques. pp. 586- 595 ,(1990) , 10.1007/3-540-46885-4_56
Andrew Clark, Jovan Dj. Golić, Ed Dawson, A Comparison of Fast Correlation Attacks fast software encryption. pp. 145- 157 ,(1996) , 10.1007/3-540-60865-6_50
Anne Canteaut, Michaël Trabbia, Improved fast correlation attacks using parity-check equations of weight 4 and 5 theory and application of cryptographic techniques. pp. 573- 588 ,(2000) , 10.1007/3-540-45539-6_40
Thomas Johansson, Fredrik Jönsson, Fast Correlation Attacks Based on Turbo Code Techniques international cryptology conference. ,vol. 1666, pp. 181- 197 ,(1999) , 10.1007/3-540-48405-1_12
Anne Canteaut, Eric Filiol, Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators fast software encryption. pp. 165- 180 ,(2000) , 10.1007/3-540-44706-7_12
Vladimir Chepyzhov, Ben Smeets, On a fast correlation attack on certain stream ciphers theory and application of cryptographic techniques. pp. 176- 185 ,(1991) , 10.1007/3-540-46416-6_16
Thomas Johansson, Fredrik Jönsson, Improved fast correlation attacks on stream ciphers via convolutional codes theory and application of cryptographic techniques. ,vol. 1592, pp. 347- 362 ,(1999) , 10.1007/3-540-48910-X_24