期刊文献+

Algebraic attacks on two kinds of special nonlinear filter generators

Algebraic attacks on two kinds of special nonlinear filter generators
下载PDF
导出
摘要 This letter proposes algebraic attacks on two kinds of nonlinear filter generators with symmetric Boolean functions as the filter fimctions. Different fxom the classical algebraic attacks, the proposed attacks take the advantage of the combinational property of a linear feedback shift register (LFSR) and the symmetric Boolean function to obtain a tow-degree algebraic relation, and hence the complexities of the proposed attacks are independent of the algebraic immunity (AI) of the filter functions. It is shown that improper combining of the LFSR with the filter function can make the filter generator suffer from algebraic attacks. As a result, the bits of the LFSR must be selected properly to input the filter function with large AI in order to withstand the proposed algebraic attacks.
出处 《High Technology Letters》 EI CAS 2012年第2期151-154,共4页 高技术通讯(英文版)
基金 Supported by the National Basic Research Program of China (No. 2007CB311201), the National Natural Science Foundation of China (No.60833008 No.60803149), and the Foundation of Guangxi Key Laboratory of Information and Communication (No.20902).
关键词 stream cipher linear feedback shift register (LFSR) Boolean function algebraic attack CRYPTANALYSIS 代数攻击 非线性滤波 发电机 线性反馈移位寄存器 布尔函数 LFSR 过滤功能 代数关系
  • 相关文献

参考文献19

  • 1Rueppel R A. Analysis and Design of Stream Ciphers, Berlin: Springer, 1986.
  • 2Golomb S W, Gong G. Signal Design for Good correlation. London Cambridge Press, 2005.81-113.
  • 3~ Bracken A. Clyptographic Properties of Boolean Functions and S- boxes. Belgium: Leuven University, 2006.
  • 4Forre R. A fast correlation attack on nonlinearly feedforward filtered shift-register sequences. In: Proceedings of the Workshop on the Theory and Application of Cryptographie Techniques on Advances in Cryptology, 1989, Houthalen, Belgium, 1990. 586- 595.
  • 5Bracken A, I_ano J. On the (Ira)Possibility of practical and secure nonlinear filters and combiners. In: Proceedings of the 12th International Workshop on Selected Areas in Cryptography 2005, Kingston, Canada, 2006. 159-174.
  • 6linear feedback. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques 2003, Warsaw, Poland, 2003.345-359.
  • 7Courtois N T. Fast algebraic attacks on stream ciphers with linear feedback. In: Proceedings of the 23rd Annual International Cryptology Conference 2003, Santa Barbara, USA. 2003. 176- 194.
  • 8Ronjom S, Hellseseth T. A new attack on the filter generator. IEEE Transactions on Information Theory, 2007, 53(5):1752- 1758.
  • 9Agreu M, Johansson T, Hell M, Ira_proving the rainbow attack by reusing colours. In: Proceedings of the 8th International Conference on Cryptology and Network Security, Kanazawa, Japan, 2009, 362-378.
  • 10Golic J D, Morgari G. Optimal correlation attack on the multiplexer generator. Information Processing Letters, 2009, 109:838-841.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部