Skip to main content
Log in

A characteristic set method for solving boolean equations and applications in cryptanalysis of stream ciphers*

  • Published:
Journal of Systems Science and Complexity Aims and scope Submit manuscript

Abstract

This paper presents a characteristic set method for solving Boolean equations, which is more efficient and has better properties than the general characteristic set method. In particular, the authors give a disjoint and monic zero decomposition algorithm for the zero set of a Boolean equation system and an explicit formula for the number of solutions of a Boolean equation system. The authors also prove that a characteristic set can be computed with a polynomial number of multiplications of Boolean polynomials in terms of the number of variables. As experiments, the proposed method is used to solve equations from cryptanalysis of a class of stream ciphers based on nonlinear filter generators. Extensive experiments show that the method is quite effective.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. W. T. Wu, Basic principles of mechanical theorem-proving in elementary geometries, J. Sys. Sci. & Math. Scis., 1984, 4(3): 207–235.

    Google Scholar 

  2. J. F. Ritt, Differential Algebra, Amer. Math. Soc. Colloquium, Providence, 1950.

  3. X. S. Gao and Y. Luo, A characteristic set method for difference polynomial systems, in Proc. ICPSS, Paris, 2004, 28–30.

  4. M. Brickenstein and A. Dreyer, PolyBoRi: A framework for Gröbner basis computations with Boolean polynomials, in Proc. MEGA, Austria, 2007. URL: http: //www.ricam.oeaw.ac.at/mega2007/electronic/26.pdf.

  5. W. Mao and J. Wu, Application of Wu’s method to symbolic model checking, ACM Press, New York, 2005, Proc. ISSAC’05, 237–244.

  6. N. Courtois, Higher order correlation attacks, XL algorithm, and cryptanalysis of Toyocrypt, ICISC, LNCS 2587, 182–199, Springer, 2002.

  7. N. Courtois, Algebraic attacks on stream ciphers with linear feedback, EUROCRPYT 2003, LNCS 2656, 345–359, Springer, 2003.

  8. J. C. Faugère and G. Ars, An algebraic cryptanalysis of nonlinear filter generators using Gröbner bases, TR No. 4739, INRIA, 2003.

  9. S. He and B. Zhang, Solving SAT by algorithm transform of Wu’s method, J. Comput. Sci. and Tech., 1999, 14(5): 468–480.

    Google Scholar 

  10. S. Smale, Mathematical problems for the next century, Math. Intelligencer, 1998, 20(2): 7–15.

    Article  Google Scholar 

  11. S. Rudeanu, Boolean Functions and Equations, North-Holland, Amsterdam, 1974.

    Google Scholar 

  12. M. Davis and H. Putnam, A computing procedure for quantification theory, J. ACM, 1960, 7(3): 201–215.

    Article  Google Scholar 

  13. R. E. Bryant, Graph-based algorithms for boolean function manipulation, IEEE Trans. on Computers, 1986, 35(8): 677–691.

    Article  Google Scholar 

  14. Y. Sato and S. Inoue, On the construction of comprehensive boolean Gröbner bases, in Proc. ASCM 2005, 145–148, World Scientific Press, Singapore.

    Google Scholar 

  15. G. Gallo and B. Mishra, Efficient algorithms and bounds forWu-Ritt characteristic sets, in Progress in Mathematics, Birkhauser, Boston, 1991, 94: 119–142.

  16. B. Li, An algorithm to decompose a polynomial ascending set into irreducible ones, Acta Anal. Funct. Appl., 2005, 7(2): 97–105.

    Google Scholar 

  17. D. Lin and Z. Liu, Some results on theorem proving in geometry over finite fields, in Proc. ISSAC’93, ACM Press, New York, 1993, 292–300.

    Google Scholar 

  18. X. Dahan, M. M. Maza, E. Schost, W. Wu, and Y. Xie, Lifting techniques for triangular decompositions, in Proc. ISSAC’05, 108–115, ACM Press, New York, 2005.

    Google Scholar 

  19. W. T. Wu, On zeros of algebraic equations-an application of Ritt principle, Chinese Science Bulletin, 1986, 31: 1–5.

    Google Scholar 

  20. S. C. Chou and X. S. Gao, Ritt-Wu’s decomposition algorithm and geometry theorem proving, in Proc. of CADE-10, LNAI 449, 207–220, Springer, 1990.

  21. S. Minto, Zero-sppressed BDDs for set manipulation in combinatorial problems, in Proc. ACM/IEEE Design Automation, ACM Press, 1993, 272–277.

  22. X. S. Gao, F. Chai, and C. Yuan, A characteristic set method for equation solving in F2 and applications in cryptanalysis of stream ciphers, MM-Preprints, 2006, 25: 42–56.

    Google Scholar 

  23. W. T. Wu, Some remarks on characeteristic-set formation, MM-Preprints, 1989, 3: 27–29.

    Google Scholar 

  24. H. M. Möller, On decomposing systems of polynomial equations with finitely many solutions, J. AAECC, 1993, 4(4): 217–230.

    Article  Google Scholar 

  25. S. C. Chou, Mechanical Geometry Theorem Proving, D. Reidel, Dordrecht, 1988.

  26. M. Kalkbrener, A generalized Euclidean algorithm for computing triangular representations of algebraic varieties, Journal of Symbolic Computation, 1993, 15: 143–167.

    Article  Google Scholar 

  27. D. Kapur and H. K. Wan, Refutational proofs of geometry theorems via characteristic sets, in Proc. ISSAC’90, ACM Press New York, 1990, 277–284.

    Google Scholar 

  28. D. Wang, An elimination method for polynomial systems, Journal of Symbolic Computation, 1993, 16: 83–114.

    Article  Google Scholar 

  29. A. Menezes, P. van Ooschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.

  30. A. Canteaut and E. Filiol, Ciphertext only reconstruction of stream ciphers based on combination generators, Fast Software Encryption, LNCS 1978, 165–180, Springer, 2000.

  31. X. S. Gao and Z. Huang, A characteristic set method for equation solving in finite fields, MM Preprints, 2008, 26: 77–92.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-Shan GAO.

Additional information

*This research is partially supported by a National Key Basic Research Project of China under Grant No. 2004CB318000.

Rights and permissions

Reprints and permissions

About this article

Cite this article

CHAI, F., GAO, XS. & YUAN, C. A characteristic set method for solving boolean equations and applications in cryptanalysis of stream ciphers*. J Syst Sci Complex 21, 191–208 (2008). https://doi.org/10.1007/s11424-008-9103-0

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11424-008-9103-0

Key words

Navigation