Abstract
A resynchronization attack is proposed on stream ciphers filtered by Maiorana-McFarland (M-M) functions and equipped with a linear resynchronization mechanism. The proposed attack utilizes the linear weakness of the resynchronization mechanism, the partial linearity of M-M functions, and applies the linear consistency test method to recover the secret key. It is shown that an M-M function should not be implemented by itself but rather in combination with other nonlinear components in stream ciphers using linear mechanisms to prevent the proposed attack. It is also shown that the use of linear resynchronization mechanisms should be avoided despite their high efficiency in stream ciphers filtered by M-M functions.
Similar content being viewed by others
References
Daemen J, Govaerts R, Vandewalle J. Resynchronization weakness in synchronous stream ciphers. In: Proceedings ofWorkshop on the theory and application of cryptographic techniques on Advances in cryptology. 1994, 159–167
Golić J D, Morgari G. On the resynchronization attack. In: Proceedings of 10th International Workshop on Fast Software Encryption. 2003, 100–110
Borissov Y, Nikova S, Preneel B, Vandewalle J. On a resynchronization weakness in a class of combiners with memory. In: Proceedings of the 3rd international conference on Security in communication networks. 2003, 164–173
Armknecht F, Lano J, Preneel B. Extending the resynchronization attack. In: Proceedings of 11th International Workshop on Selected Areas in Cryptography. 2005, 19–38
Juhani M, Saarinen O. Chosen-IV statistical attacks on eStream ciphers. In: Proceedings of the International Conference on Security and Cryptography. 2006, 260–266
Englund H, Johansson T, Sonmez Turn M. A framework for chosen IV statistical analysis of stream ciphers. In: Proceedings of 8th International Conference on Cryptology in India. 2007, 268–281
Fischer S, Khazaei S, Meier W. Chosen IV statistical analysis for key recovery attacks on stream ciphers. In: Proceedings of 1st International Conference on Cryptology in Africa. 2008, 236–245
Dinur I, Shamir A. Cube attacks on tweakable black box polynomials. In: Proceedings of 28th Annual International Conference on Advances in Cryptology. 2009, 278–299
Camion P, Carlet C, Charpin P, Sendrier N. On correlation-immune functions. In: Proceedings of 11th Annual International Cryptology Conference. 1991, 86–100
Seberry J, Zhang XM, Zheng Y. On constructions and nonlinearity of correlation immune functions. In: Proceedings of Workshop on the theory and application of cryptographic techniques on Advances in cryptology. 1993, 181–193
Chee S, Lee S, Lee D, Sung S H. On the correlation immune functions and their nonlinearity. In: Proceedings of International Conference on the Theory and Applications of Cryptology and Information Security. 1996, 232–243
Carlet C. A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction. In: Proceedings of 22nd Annual International Cryptology Conference on Advances in Cryptology. 2002, 549–564
Carlet C. On the confusion and diffusion properties of Maiorana-McFarland’s and extended Maiorana-McFarland’s functions. Journal of Complexity, 2004, 20(2–3): 182–204
Pasalic E. Maiorana-McFarland class: degree optimization and algebraic properties. IEEE Transactions on Information Theory, 2006, 52(10): 4581–4594
Zeng K, Yang C H, Rao T R N. On the linear consistency test (LCT) in cryptanalysis with applications. In: Proceedings of 9th Annual International Cryptology Conference on Advances in Cryptology. 1990, 164–174
Pasalic E. On guess and determine cryptanalysis of LFSR-based stream ciphers. IEEE Transactions on Information Theory, 2009, 55(7): 3398–3406
Gong G, Khoo K. Additive autocorrelation of resilient Boolean functions. In: Proceedings of 10th Annual International Workshop on Selected Areas in Cryptography. 2003, 275–290
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, W., Hu, Y. A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions. Front. Comput. Sci. China 5, 158–162 (2011). https://doi.org/10.1007/s11704-011-9158-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-011-9158-2