On stern's attack against secret truncated linear congruential generators

作者: Scott Contini , Igor E. Shparlinski

DOI: 10.1007/11506157_5

关键词: Linear approximationAlgorithmLattice reductionPrivate lifeHeuristic (computer science)SternCryptanalysisTime complexityComputer science

摘要: In 1987, Stern showed how the parameters for secret truncated linear congruential generators could be derived in polynomial time. Here, we present a modification to that algorithm which makes it simpler, more robust, and require less data. We then careful analysis of algorithm, establish some limits its applicability. Thus, may not necessarily insecure properly chosen parameters. Unfortunately, as original all results remain heuristic, however numerical experiments support our conclusions.

参考文章(16)
Antoine Joux, Jacques Stern, Lattice Reduction: A Toolbox for the Cryptanalyst Journal of Cryptology. ,vol. 11, pp. 161- 185 ,(1998) , 10.1007/S001459900042
C.P. Schnorr, A hierarchy of polynomial time lattice basis reduction algorithms Theoretical Computer Science. ,vol. 53, pp. 201- 224 ,(1987) , 10.1016/0304-3975(87)90064-8
Hugo Krawczyk, How to predict congruential generators Journal of Algorithms. ,vol. 13, pp. 527- 545 ,(1992) , 10.1016/0196-6774(92)90054-G
Miklós Ajtai, Ravi Kumar, D. Sivakumar, A sieve algorithm for the shortest lattice vector problem Proceedings of the thirty-third annual ACM symposium on Theory of computing - STOC '01. pp. 601- 610 ,(2001) , 10.1145/380752.380857
Pär Kurlberg, Carl Pomerance, On the periods of the linear congruential and power generators Acta Arithmetica. ,vol. 119, pp. 149- 169 ,(2004) , 10.4064/AA119-2-2
Deciphering a linear congruential encryption IEEE Transactions on Information Theory. ,vol. 31, pp. 49- 52 ,(1985) , 10.1109/TIT.1985.1056997