Abstract
The generalized inversion attack on nonlinear filter generators is developed and analyzed by the theory of critical branching processes. Unlike the inversion attack which requires that the filter function be linear in the first or the last input variable, this attack can be applied for any filter function. Both theory and systematic experiments conducted show that its time complexity remains close to 2M, M being the input memory size, while the additional memory space required is relatively small for most the filter functions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
R. J. Anderson, “Searching for the optimum correlation attack,” Fast Software Encryption — Leuven’ 94, Lecture Notes in Computer Science, vol. 1008, B. Preneel ed., Springer-Verlag, pp. 137–143, 1995.
K. B. Athreya and P. E. Ney, Branching Processes. Springer-Verlag, Berlin, 1972.
J. Dj. Golić, “On the security of nonlinear filter generators,” Fast Software Encryption — Cambridge’ 96, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer-Verlag, pp. 173–188, 1996.
T. H. Harris, The Theory of Branching Processes. Springer-Verlag, Berlin, 1963.
W. Meier and O. Staffelbach, “Fast correlation attacks on certain stream ciphers,” Journal of Cryptology, vol. 1(3), pp. 159–176, 1989.
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. New York: CRC Press, 1997.
R. A. Rueppel, Analysis and Design of Stream Ciphers. Berlin: Springer-Verlag, 1986.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Golić, J.D., Clark, A., Dawson, E. (1999). Inversion Attack and Branching. In: Pieprzyk, J., Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 1999. Lecture Notes in Computer Science, vol 1587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48970-3_8
Download citation
DOI: https://doi.org/10.1007/3-540-48970-3_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65756-9
Online ISBN: 978-3-540-48970-2
eBook Packages: Springer Book Archive