Skip to main content

Fast correlation attacks and multiple linear approximations

  • Cryptanalysis
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Included in the following conference series:

Abstract

The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear filter generators in order to investigate the effect of multiple linear transforms of the same linear recurring sequence being correlated to the keystream sequence. Systematic computer simulations on random balanced filter functions reveal that the attack is successful if the number of parity-checks used is sufficiently large given the correlation coefficient of the best affine approximation to the filter function. Nevertheless, the attack is more successful when applied to the independent correlation noise which appears in memoryless combiners where a multiple linear transform effect is not present. The experiments conducted show that the attack is successful on many publicly proposed filter functions and indicate that some bent filter functions may be easier to attack than the others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. J. Anderson. Searching for optimum correlation attack. In Fast Software Encryption — Leuven '94, volume 1008 of Lecture Notes in Computer Science, pages 137–143. Springer-Verlag, 1995.

    Google Scholar 

  2. R. Forré. A fast correlation attack on nonlinearly filtered shift-register sequences. In J. J. Quisquater and J. Vandewalle, editors, Advances in Cryptology — CRYPTO '89, volume 434 of Lecture Notes in Computer Science, pages 586–595. Springer-Verlag, 1990.

    Google Scholar 

  3. J. Dj. Golić. Correlation via linear sequential circuit approximation of combiners with memory. In R. A. Rueppel, editor, Advances in Cryptology — EUROCRYPT '92, volume 658 of Lecture Notes in Computer Science, pages 113–123. Springer-Verlag, 1993.

    Google Scholar 

  4. J. Dj. Golić. Computation of low-weight parity-check polynomials. Electronics Letters, 32(21):1981–1982, 1996.

    Article  Google Scholar 

  5. J. Dj. Golić. On the security of nonlinear filter generators. In D. Gollmann, editor, Fast Software Encryption — Cambridge '96, volume 1039 of Lecture Notes in Computer Science, pages 173–188, 1996.

    Google Scholar 

  6. J. Dj. Golić, M. Salmasizadeh, A. Clark, A. Khodkar, and E. Dawson. Discrete optimisation and fast correlation attacks. In E. Dawson and J. Golić, editors, Cryptography: Policy and Algorithms, volume 1029 of Lecture Notes in Computer Science, pages 186–200. Springer-Verlag, 1996.

    Google Scholar 

  7. S. LEE, S. Chee, S. Park, and S. Park. Conditional correlation attack on nonlinear filter generators. In K. Kim and T. Matsumoto, editors, Advances in Cryptology — ASIACRYPT '96, volume 1163 of Lecture Notes in Computer Science, pages 360–367. Springer-Verlag, 1996.

    Google Scholar 

  8. W. Meier and O. Staffelbach. Correlation properties of combiners with memory in stream ciphers. Journal of Cryptology, 5(1):67–86, 1992.

    Article  MathSciNet  Google Scholar 

  9. R. Rueppel. Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin, 1986.

    Google Scholar 

  10. H. Schildt. C the Complete Reference. Osborne McGraw-Hill, Berkeley, CA, 1990.

    Google Scholar 

  11. T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Comput., C-34:81–85, January 1985.

    Google Scholar 

  12. T. Siegenthaler. Cryptanalyst's representation of nonlinearly filtered mi-sequences. In F. Pichler, editor, Advances in Cryptology — EUROCRYPT '85, volume 219 of Lecture Notes in Computer Science, pages 103–110. Springer-Verlag, 1986.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Salmasizadeh, M., Simpson, L., Golić, J.D., Dawson, E. (1997). Fast correlation attacks and multiple linear approximations. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027930

Download citation

  • DOI: https://doi.org/10.1007/BFb0027930

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics