Abstract
This paper presents a characteristic set method for solving Boolean equations, which is more efficient and has better properties than the general characteristic set method. In particular, the authors give a disjoint and monic zero decomposition algorithm for the zero set of a Boolean equation system and an explicit formula for the number of solutions of a Boolean equation system. The authors also prove that a characteristic set can be computed with a polynomial number of multiplications of Boolean polynomials in terms of the number of variables. As experiments, the proposed method is used to solve equations from cryptanalysis of a class of stream ciphers based on nonlinear filter generators. Extensive experiments show that the method is quite effective.
Similar content being viewed by others
References
W. T. Wu, Basic principles of mechanical theorem-proving in elementary geometries, J. Sys. Sci. & Math. Scis., 1984, 4(3): 207–235.
J. F. Ritt, Differential Algebra, Amer. Math. Soc. Colloquium, Providence, 1950.
X. S. Gao and Y. Luo, A characteristic set method for difference polynomial systems, in Proc. ICPSS, Paris, 2004, 28–30.
M. Brickenstein and A. Dreyer, PolyBoRi: A framework for Gröbner basis computations with Boolean polynomials, in Proc. MEGA, Austria, 2007. URL: http: //www.ricam.oeaw.ac.at/mega2007/electronic/26.pdf.
W. Mao and J. Wu, Application of Wu’s method to symbolic model checking, ACM Press, New York, 2005, Proc. ISSAC’05, 237–244.
N. Courtois, Higher order correlation attacks, XL algorithm, and cryptanalysis of Toyocrypt, ICISC, LNCS 2587, 182–199, Springer, 2002.
N. Courtois, Algebraic attacks on stream ciphers with linear feedback, EUROCRPYT 2003, LNCS 2656, 345–359, Springer, 2003.
J. C. Faugère and G. Ars, An algebraic cryptanalysis of nonlinear filter generators using Gröbner bases, TR No. 4739, INRIA, 2003.
S. He and B. Zhang, Solving SAT by algorithm transform of Wu’s method, J. Comput. Sci. and Tech., 1999, 14(5): 468–480.
S. Smale, Mathematical problems for the next century, Math. Intelligencer, 1998, 20(2): 7–15.
S. Rudeanu, Boolean Functions and Equations, North-Holland, Amsterdam, 1974.
M. Davis and H. Putnam, A computing procedure for quantification theory, J. ACM, 1960, 7(3): 201–215.
R. E. Bryant, Graph-based algorithms for boolean function manipulation, IEEE Trans. on Computers, 1986, 35(8): 677–691.
Y. Sato and S. Inoue, On the construction of comprehensive boolean Gröbner bases, in Proc. ASCM 2005, 145–148, World Scientific Press, Singapore.
G. Gallo and B. Mishra, Efficient algorithms and bounds forWu-Ritt characteristic sets, in Progress in Mathematics, Birkhauser, Boston, 1991, 94: 119–142.
B. Li, An algorithm to decompose a polynomial ascending set into irreducible ones, Acta Anal. Funct. Appl., 2005, 7(2): 97–105.
D. Lin and Z. Liu, Some results on theorem proving in geometry over finite fields, in Proc. ISSAC’93, ACM Press, New York, 1993, 292–300.
X. Dahan, M. M. Maza, E. Schost, W. Wu, and Y. Xie, Lifting techniques for triangular decompositions, in Proc. ISSAC’05, 108–115, ACM Press, New York, 2005.
W. T. Wu, On zeros of algebraic equations-an application of Ritt principle, Chinese Science Bulletin, 1986, 31: 1–5.
S. C. Chou and X. S. Gao, Ritt-Wu’s decomposition algorithm and geometry theorem proving, in Proc. of CADE-10, LNAI 449, 207–220, Springer, 1990.
S. Minto, Zero-sppressed BDDs for set manipulation in combinatorial problems, in Proc. ACM/IEEE Design Automation, ACM Press, 1993, 272–277.
X. S. Gao, F. Chai, and C. Yuan, A characteristic set method for equation solving in F2 and applications in cryptanalysis of stream ciphers, MM-Preprints, 2006, 25: 42–56.
W. T. Wu, Some remarks on characeteristic-set formation, MM-Preprints, 1989, 3: 27–29.
H. M. Möller, On decomposing systems of polynomial equations with finitely many solutions, J. AAECC, 1993, 4(4): 217–230.
S. C. Chou, Mechanical Geometry Theorem Proving, D. Reidel, Dordrecht, 1988.
M. Kalkbrener, A generalized Euclidean algorithm for computing triangular representations of algebraic varieties, Journal of Symbolic Computation, 1993, 15: 143–167.
D. Kapur and H. K. Wan, Refutational proofs of geometry theorems via characteristic sets, in Proc. ISSAC’90, ACM Press New York, 1990, 277–284.
D. Wang, An elimination method for polynomial systems, Journal of Symbolic Computation, 1993, 16: 83–114.
A. Menezes, P. van Ooschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
A. Canteaut and E. Filiol, Ciphertext only reconstruction of stream ciphers based on combination generators, Fast Software Encryption, LNCS 1978, 165–180, Springer, 2000.
X. S. Gao and Z. Huang, A characteristic set method for equation solving in finite fields, MM Preprints, 2008, 26: 77–92.
Author information
Authors and Affiliations
Corresponding author
Additional information
*This research is partially supported by a National Key Basic Research Project of China under Grant No. 2004CB318000.
Rights and permissions
About this article
Cite this article
CHAI, F., GAO, XS. & YUAN, C. A characteristic set method for solving boolean equations and applications in cryptanalysis of stream ciphers*. J Syst Sci Complex 21, 191–208 (2008). https://doi.org/10.1007/s11424-008-9103-0
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11424-008-9103-0