Abstract
This paper proposes a novel approach for cryptanalysis of certain cryptographic pseudorandom sequence (keystream) generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis based on the following: Suppose certain B bits of the LFSM initial state as known and identify time instances where certain arguments of the nonlinear function depend only on these B bits and are equal to zero. As opposed to previously reported methods, the proposed one also identifies and uses certain characteristics of the LFSM state-transition matrix in order to reduce the nonlinearity of the system of overdefined equations employed in an algebraic attack scenario, or to reduce the noise introduced by the linearization of the nonlinear function which corrupts the linear equations employed in a correlation attack scenario.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Armknecht, F.: Improving fast algebraic attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 65–82. Springer, Heidelberg (2004)
Braeken, A., Nikov, V., Nikova, S., Preneel, B.: On Boolean functions with generalized cryptographic properties. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 120–135. Springer, Heidelberg (2004)
Chose, P., Joux, A., Mitton, M.: Fast Correlation Attacks: An Algorithmic Point of View. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 209–221. Springer, Heidelberg (2002)
Courtois, N.T.: Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 182–199. Springer, Heidelberg (2003)
Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)
Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)
Fossorier, M.P.C., Mihaljević, M.J., Imai, H.: A Unified Analysis on Block Decoding Approaches for the Fast Correlation attack. In: 2005 IEEE Int. Symp. Inform. Theory - ISIT 2005, Proceedings, Adelaide, Australia, September 2005, 4 p. (2005) (accepted for publication)
Hawkes, P., Rose, G.: Rewriting variables: the complexity of Fast algebraic attacks on stream ciphers. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 390–406. Springer, Heidelberg (2004)
Johansson, T., Jonsson, F.: Theoretical Analysis of a Correlation Attack Based on Convolutional Codes. IEEE Trans. Information Theory 48, 2173–2181 (2002)
Lu, P.: A new correlation attack on LFSR sequences with high error tolerance. In: Feng, K., Niederreiter, H., Xing, C. (eds.) Coding, Cryptography and Combinatorics, May 2004. Birkhauser Verlag AG, Basel (2004)
Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Roton (1997)
Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. Journal of Cryptology 1, 159–176 (1989)
Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of Boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 474–491. Springer, Heidelberg (2004)
Mihaljević, M.J., Fossorier, M.P.C., Imai, H.: On decoding techniques for cryptanalysis of certain encryption algorithms. IEICE Trans. Fundamentals E84-A, 919–930 (2001)
Mihaljević, M.J., Golić, J.D.: A method for convergence analysis of iterative probabilistic decoding. IEEE Trans. Inform. Theory 46, 2206–2211 (2000)
Mihaljević, M.J., Fossorier, M.P.C., Imai, H.: Fast Correlation Attack Algorithm with List Decoding and an Application. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 196–210. Springer, Heidelberg (2002)
Mihaljević, M.J., Imai, H.: Cryptanalysis of TOYOCRYPT-HS1 stream cipher. IEICE Transactions on Fundamentals E85-A, 66–73 (2002)
Mihaljević, M.J., Kohno, R.: Cryptanalysis of fast encryption algorithm for multimedia FEA-M. IEEE Commun. Lett. 6, 382–384 (2002)
Mihaljević, M.J., Imai, H.: The decimated sample based improved algebraic attacks on the nonlinear filters. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 310–323. Springer, Heidelberg (2005)
Mihaljević, M.J., Fossorier, M.P.C., Imai, H.: Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 155–168. Springer, Heidelberg (2005)
Molland, H., Mathiassen, J.E., Helleseth, T.: Improved Fast Correlation Attack using Low Rate Codes. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 67–81. Springer, Heidelberg (2003)
Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Comput. C-34, 81–85 (1985)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mihaljević, M.J., Fossorier, M.P.C., Imai, H. (2006). A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. In: Fossorier, M.P.C., Imai, H., Lin, S., Poli, A. (eds) Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. AAECC 2006. Lecture Notes in Computer Science, vol 3857. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11617983_20
Download citation
DOI: https://doi.org/10.1007/11617983_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31423-3
Online ISBN: 978-3-540-31424-0
eBook Packages: Computer ScienceComputer Science (R0)