Abstract
We present some new ideas on attacking stream ciphers based on regularly clocked shift registers. The nonlinear filter functions used in such systems may leak information if they interact with shifted copies of themselves, and this gives us a systematic way to search for correlations between a keystream and the underlying shift register sequence.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
RJ Anderson, “Derived Sequence Attacks on Stream Ciphers”, presented at the rump session of Crypto 93
RJ Anderson, “Why Cryptosystems Fail”, in Communications of the ACM v 37 no 11 (November 1994) pp 32–40
RJ Anderson, “Tree Functions and Cipher Systems”, in Cryptologia v XV no 3 (July 1991) pp 194–202
E Biham, A Shamir, ‘Differential Cryptanalysis of the Data Encryption Standard', Springer 1993
V Chepyzhov, B Smeets, “ On a Fast Correlation Attack on Certain Stream Ciphers”, in Advances in Cryptology — Eurocrypt 91, Springer LNCS v 547 pp 176–185
TR Cain, AT Sherman, “How to Break Gifford's Cipher”, in Proceedings of the 2nd ACM Conference on Computer and Communications Security (ACM, Nov 94) pp 198–209
C Ding, G Xiao, W Shan, 'The Stability Theory of Stream Ciphers', Springer LNCS v 561 (1991)
R Forré, “A Fast Correlation Attack on Nonlinearly Feedforward Filtered Shift-register Sequences”, in Advances in Cryptology — Eurocrypt 89, Springer LNCS v 434, pp 586–562
JD Golić, “Correlation via Linear Sequential Circuit Approximation of Combiners with Memory”, in Advances in Cryptology — Eurocrypt 92, Springer LNCS v 658, pp 113–123
GJ Kühn, “Algorithms for Self-Synchronising Ciphers”, in Proc COMSIG 88
G Kühn, F Bruwer, W Smit, “ 'n Vinnige Veeldoelige Enkripsievlokkie”, supplementary paper to Proceedings of Infosec 1990
G Mayhew, “A Low Cost, High Speed Encryption System and Method”, in Proc 1994 IEEE Computer Society Symposium on Research in Security and Privacy (IEEE, 1994) pp 147–154
DJC MacKay, “A Free Energy Minimization Framework for Inference Problems in Modulo 2 Arithmetic” in this volume pp 179–195
W Millan, EP Dawson, LJ O'Connor, “Fast Attacks on Tree-structured Ciphers”, in Proceedings of Workshop in Selected Areas in Cryptography (Queen's University, 1994) pp 146–158
G Mayhew, R Frazee, M Bianco, “The Kinetic Protection Device”, in Proceedings of the 15th National Computer Security Conference (NIST, 1992) pp 310–318
MJ Mihaljević, JD Golić, “Convergence of a Bayesian Iterative Errorcorrection Procedure on a Noisy Shift Register Sequence”, in Advances in Cryptology — Eurocrypt 92, Springer LNCS v 658, pp 124–137
W Meier, O Staffelbach, “Fast correlation attacks on certain stream ciphers”, in Journal of Cryptology v 1 1989 pp 159–176
W Meier, O Staffelbach, “Nonlinearity criteria for cryptographic functions”, in Advances in Cryptology — Eurocrypt 89, Springer LNCS v 434 pp 549–562
B Snow, ‘Multiple Independent Binary Bit Stream Generator', US Patent 5,237,615 (17 August 1993)
T Siegenthaler, “ Correlation Immunity of Nonlinear Combining Functions for Cryptographic Applications”, in IEEE Transactions on Information Theory IT-30 no 5 (Sep 1984) pp 776–780
T Siegenthaler, “Decrypting a Class of Stream Ciphers Using Ciphertext Only”, in IEEE Transactions on Computers C-34 no 1 (Jan 1985) pp 81–85
T Siegenthaler, “Cryptanalysts' Representation of Nonlinearly Filtered m-Sequences”, in Advances in Cryptology — Eurocrypt 85, Springer LNCS v 219 pp 103–110
PC van Oorschot, MJ Wiener, “Parallel Collision Search with Application to Hash Functions and Discrete Logarithms”, in Proceedings of the 2nd ACM Conference on Computer and Communications Security (ACM, Nov 94) pp 210–218
GZ Xiao, JL Massey, “A spectral characterisation of correlation-immune combining functions”, in IEEE Transactions on Information Theory IT-34 (May 1988) pp 569–571
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anderson, R. (1995). Searching for the optimum correlation attack. In: Preneel, B. (eds) Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science, vol 1008. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60590-8_11
Download citation
DOI: https://doi.org/10.1007/3-540-60590-8_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60590-4
Online ISBN: 978-3-540-47809-6
eBook Packages: Springer Book Archive