A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
[chapter]
2009
Lecture Notes in Computer Science
We investigate such attacks and extend them to the case where a linearly filtered NFSR is combined linearly with one or more non linearly filtered LFSRs. ...
We show that the existing algebraic and correlation attacks against the filter generator can be transposed to mount algebraic or correlation attacks against this dual construction. ...
A large number of attack techniques applicable to filter generators have been proposed like correlation and fast correlation attacks [13, 18, 19, 20] or algebraic and fast algebraic attacks [12, 11, ...
doi:10.1007/978-3-642-04159-4_12
fatcat:q4bbj2fxw5gvnkra4cgnjntcxe
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
[chapter]
2006
Lecture Notes in Computer Science
attacks and (fast) algebraic attacks. ...
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attacks, (fast) correlation ...
In the usual algebraic attack, equations between one bit of the output of the filter or combination generator and the initial state of the LFSR are searched. ...
doi:10.1007/11693383_11
fatcat:2ck6ddei2rc7dlnbef55gpr33y
Open Problems Related to Algebraic Attacks on Stream Ciphers
[chapter]
2006
Lecture Notes in Computer Science
We also investigate the design criteria which may guarantee a high resistance to algebraic attacks for a keystream generator based on a linear transition function. ...
The recently developed algebraic attacks apply to all keystream generators whose internal state is updated by a linear transition function, including LFSR-based generators. ...
Acknowledgements Many thanks to Daniel Augot and Matthew Parker for their contributions to this work. ...
doi:10.1007/11779360_10
fatcat:urhm46luz5hp7dcrwjbssa2oeu
Algebraic analysis of the SSS stream cipher
2011
Proceedings of the 4th international conference on Security of information and networks - SIN '11
Based on these results, we conclude that a well-chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks. ...
In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the keydependent substitution box (SBox) in the nonlinear filter ...
DISCUSSION AND CONCLUSION The algebraic attack on SOBER-t32 viewed the NLF as a combiner with two output bits (α0 and α1) and only one memory bit (the carry bit). ...
doi:10.1145/2070425.2070457
dblp:conf/sin/ALMashrafiWSBD11
fatcat:bgxfyenqq5esrgqhpsdhgsv3qm
Attacks Against Filter Generators Exploiting Monomial Mappings
[chapter]
2016
Lecture Notes in Computer Science
Filter generators are vulnerable to several attacks which have led to well-known design criteria on the Boolean filtering function. ...
It is proved here that this monomial equivalence does not affect the resistance of the generator against algebraic attacks, while it usually impacts the resistance to correlation attacks. ...
by Rønjom and Cid has no impact on the resistance of a filter generator against algebraic attacks and their variants. ...
doi:10.1007/978-3-662-52993-5_5
fatcat:z7aaqhcxfvcclntkwmwgym44e4
Simplifying algebraic attacks with univariate analysis
2011
2011 Information Theory and Applications Workshop
Such a view simplifies theory on algebraic attacks on such ciphers and provides an alternative view of the Rønjom-Helleseth attack. ...
With this view, one can show that, 1) the problem of estimating algebraic immunity and spectral immunity is closely connected to determining low-weight codewords in cyclic codes, and 2) the least number ...
Filter and combiner generators based on linear and nonlinear feedback shift registers are typical examples of such. ...
doi:10.1109/ita.2011.5743578
dblp:conf/ita/HellesethR11
fatcat:37elv3fpdzg4tgdbn5hm2tmv7e
Security analysis of linearly filtered NLFSRs
2013
Journal of Mathematical Cryptology
We extend the attack on linear combinations of Linearly Filtered NLF-SRs as well. ...
Our contributions are applying distinguishing attack on Linearly Filtered NLFSR as a primitive or associated with filter generators. ...
We examine the security of LF-NLFSR, random LF-NLFSR and combination of LF-NLFSR and filter generators against distinguishing attack. ...
doi:10.1515/jmc-2013-5009
fatcat:a7sonsapdrgwtjtotjmrdphe6m
Transform Domain Analysis of Sequences
[article]
2015
arXiv
pre-print
The time and frequency domain behavior of non-linear filter and combiner generators is discussed along with some novel observations based on the Chinese Remainder Theorem (CRT). ...
The proposed approach is demonstrated on some examples of combiner generators and is scalable to general configuration of combiner generators. ...
in the last stage of DFT spectral attacks attacks on combiner generators. ...
arXiv:1503.00943v2
fatcat:cjrh22b6tfbdtdr5id5rmguuau
Algebraic Techniques in Differential Cryptanalysis Revisited
[chapter]
2011
Lecture Notes in Computer Science
At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differential cryptanalysis. They introduced three new attacks, namely Attack A, Attack B and Attack C. ...
Our work helps to understand which equations are important in the differential-algebraic attack. Based on our findings, we present two new differential-algebraic attacks. ...
The authors would like thank the anonymous reviewers for their detailed comments and suggestions. ...
doi:10.1007/978-3-642-22497-3_9
fatcat:2zo7odfg6bebrd6lcldffvj3e4
Strengthening Crypto-1 Cipher Against Algebraic Attacks
2015
Journal of ICT Research and Applications
One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. ...
Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. ...
Acknowledgements We would like to express our gratitude to the director and all lecturers of Telkom University, especially at the Master Training Program of the Graduate School, and friends for their moral ...
doi:10.5614/itbj.ict.res.appl.2015.9.1.5
fatcat:cxu5k3oaufdvtbo2yh7en5jube
Extensions of the Cube Attack Based on Low Degree Annihilators
[chapter]
2009
Lecture Notes in Computer Science
2009) Extensions of the cube attack based on low degree annihilators. Abstract. ...
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. ...
We also did some experiments to find low degree implicit equations for the vectorial cube attack and got some results which are better than that expected by theory. ...
doi:10.1007/978-3-642-10433-6_7
fatcat:35lhd6lk5fezzcvs6lj6jpvgdi
Algebraic Attacks on Stream Ciphers with Linear Feedback
[chapter]
2003
Lecture Notes in Computer Science
Our new general algebraic attack breaks stream ciphers satisfying all the previously known design criteria in at most the square root of the complexity of the previously known generic attack. ...
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f . ...
Many thanks to Philip Hawkes, Josef Pieprzyk and the anonymous referees of Eurocrypt for their helpful comments. ...
doi:10.1007/3-540-39200-9_21
fatcat:jnfd2hey35eplnbmqahxhei5by
A different algebraic analysis of the ZUC stream cipher
2011
Proceedings of the 4th international conference on Security of information and networks - SIN '11
Preliminary algebraic analysis of the ZUC cipher indicates that the cipher may be vulnerable to algebraic attack. ...
In this paper we present an alternative algebraic analysis method for the ZUC stream cipher, using a combiner to represent the nonlinear function. ...
ALGEBRAIC ATTACK Algebraic attacks on symmetric ciphers were first applied to block ciphers in 2002 [6] and then to stream ciphers in 2003 [5] . ...
doi:10.1145/2070425.2070455
dblp:conf/sin/AlMashrafi11
fatcat:jyp63j6j7ng5hf3pwkax4ycwca
A Stream Cipher Algorithm based on Nonlinear Combination Generator with Enhanced Security for Image Encryption
2012
International Journal of Computer Applications
attack, correlation attack and algebraic attack. ...
This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. ...
Algebraic Attack In the algebraic attacks, the system is rewritten in the form of a nonlinear system of equations between the output of the filtering function f and its inputs in the following way: ) ( ...
doi:10.5120/8855-2807
fatcat:gqht2qzhqrbsdja5bwiwibsj4i
Cryptanalysis of alternating step generators
2015
2015 International Conference on Military Communications and Information Systems (ICMCIS)
The analysis of the best known attacks on the alternating step generator led us to add nonlinear filtering functions and the nonlinear scrambler to the construction. ...
In this paper we give complexities of these attacks applied to the modified alternating step generator with nonlinear filters and the scrambler. ...
We concentrated on selecting proper nonlinear functions -ones as feedback functions and other ones as filtering and combining functions of shift registers. ...
doi:10.1109/icmcis.2015.7158683
fatcat:ap63hp5kpbhyzmwkhnnx5srlwu
« Previous
Showing results 1 — 15 out of 11,119 results