Skip to main content

Conditional correlation attack on nonlinear filter generators

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1163))

Abstract

In this paper, the optimum correlation attack recently introduced by R. Anderson is improved to be applicable to most of the nonlinear filter generators. We propose a conditional correlation attack by introducing a novel notion of the conditional linear approximation. It is shown that there are always strong correlations between key stream sequences and their corresponding input bits or their linear combinations. Finally, we suggest a practical attacking method that can be applied to most of the nonlinear filter generators.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson, “Searching for the Optimum Correlation Attack”, Fast Software Encryption — Leuven'94, LNCS 1008, Springer-Verlag, pp. 137–143, 1995.

    Google Scholar 

  2. S. Chee, S. Lee, and K. Kim, “Semi-bent Functions”, Advances in Cryptology — ASIACRYPT'94, LNCS 914, Springer-Verlag, pp. 107–118, 1995.

    Google Scholar 

  3. R. Forré, “A Fast Correlation Attack on Nonlinearly Feedforward Filtered Shift-Register Sequences”, Advances in Cryptology — EUROCRYPT'89, LNCS 434, Springer-Verlag, pp. 586–595, 1990.

    Google Scholar 

  4. J. Dj. Golic, “On Security of Nonlinear Filter Generators”, Fast Software Encryption — Cambridge'96, LNCS 1039, Springer-Verlag, pp. 173–188, 1996.

    Google Scholar 

  5. G. L. Mayhew, “A Low Cost, High Speed Encryption System and Method”, Proc. of the 1994 IEEE Computer Society Symposium on Research and Security and Privacy, pp. 147–154, 1994.

    Google Scholar 

  6. W. Meier and O. Staffelbach, “Fast Correlation Attacks on Stream Ciphers”, Advances in Cryptology — EUROCRYPT'88, LNCS 330, Springer-Verlag, pp. 301–314, 1989.

    Google Scholar 

  7. S. Park, S. Lee, and S.-C. Goh, “On the Security of the Gollmann Cascades”, Advances in Cryptology — CRYPTO'95, LNCS 963, Springer-Verlag, pp. 148–156, 1995.

    Google Scholar 

  8. R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.

    Google Scholar 

  9. R. A. Rueppel, “Stream ciphers”, in Contemporary Cryptography: the Science of Information Integrity, ch. 2, pp. 65–134, IEEE Press, 1992.

    Google Scholar 

  10. J. Seberry, X.-M. Zhang, and Y. Zheng, “On Constructions and Nonlinearity of Correlation immune Functions”, Advances in Cryptology — EUROCRYPT'93, LNCS 765, Springer-Verlag, pp. 181–199, 1994.

    Google Scholar 

  11. T. Siegenthaler, “Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences”, Advances in Cryptology — EUROGRYPT'85, LNCS 219, Springer-Verlag, pp. 103–110, 1986.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kwangjo Kim Tsutomu Matsumoto

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag

About this paper

Cite this paper

Lee, S., Chee, S., Park, S., Park, S. (1996). Conditional correlation attack on nonlinear filter generators. In: Kim, K., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '96. ASIACRYPT 1996. Lecture Notes in Computer Science, vol 1163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0034861

Download citation

  • DOI: https://doi.org/10.1007/BFb0034861

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61872-0

  • Online ISBN: 978-3-540-70707-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics