11,119 Hits in 4.9 sec

Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers [chapter]

Côme Berbain, Henri Gilbert, Antoine Joux
2009 Lecture Notes in Computer Science  
We investigate such attacks and extend them to the case where a linearly filtered NFSR is combined linearly with one or more non linearly filtered LFSRs.  ...  We show that the existing algebraic and correlation attacks against the filter generator can be transposed to mount algebraic or correlation attacks against this dual construction.  ...  A large number of attack techniques applicable to filter generators have been proposed like correlation and fast correlation attacks [13, 18, 19, 20] or algebraic and fast algebraic attacks [12, 11,  ... 
doi:10.1007/978-3-642-04159-4_12 fatcat:q4bbj2fxw5gvnkra4cgnjntcxe

On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners [chapter]

An Braeken, Joseph Lano
2006 Lecture Notes in Computer Science  
attacks and (fast) algebraic attacks.  ...  A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attacks, (fast) correlation  ...  In the usual algebraic attack, equations between one bit of the output of the filter or combination generator and the initial state of the LFSR are searched.  ... 
doi:10.1007/11693383_11 fatcat:2ck6ddei2rc7dlnbef55gpr33y

Open Problems Related to Algebraic Attacks on Stream Ciphers [chapter]

Anne Canteaut
2006 Lecture Notes in Computer Science  
We also investigate the design criteria which may guarantee a high resistance to algebraic attacks for a keystream generator based on a linear transition function.  ...  The recently developed algebraic attacks apply to all keystream generators whose internal state is updated by a linear transition function, including LFSR-based generators.  ...  Acknowledgements Many thanks to Daniel Augot and Matthew Parker for their contributions to this work.  ... 
doi:10.1007/11779360_10 fatcat:urhm46luz5hp7dcrwjbssa2oeu

Algebraic analysis of the SSS stream cipher

Mufeed Juma ALMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson
2011 Proceedings of the 4th international conference on Security of information and networks - SIN '11  
Based on these results, we conclude that a well-chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.  ...  In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the keydependent substitution box (SBox) in the nonlinear filter  ...  DISCUSSION AND CONCLUSION The algebraic attack on SOBER-t32 viewed the NLF as a combiner with two output bits (α0 and α1) and only one memory bit (the carry bit).  ... 
doi:10.1145/2070425.2070457 dblp:conf/sin/ALMashrafiWSBD11 fatcat:bgxfyenqq5esrgqhpsdhgsv3qm

Attacks Against Filter Generators Exploiting Monomial Mappings [chapter]

Anne Canteaut, Yann Rotella
2016 Lecture Notes in Computer Science  
Filter generators are vulnerable to several attacks which have led to well-known design criteria on the Boolean filtering function.  ...  It is proved here that this monomial equivalence does not affect the resistance of the generator against algebraic attacks, while it usually impacts the resistance to correlation attacks.  ...  by Rønjom and Cid has no impact on the resistance of a filter generator against algebraic attacks and their variants.  ... 
doi:10.1007/978-3-662-52993-5_5 fatcat:z7aaqhcxfvcclntkwmwgym44e4

Simplifying algebraic attacks with univariate analysis

Tor Helleseth, Sondre Ronjom
2011 2011 Information Theory and Applications Workshop  
Such a view simplifies theory on algebraic attacks on such ciphers and provides an alternative view of the Rønjom-Helleseth attack.  ...  With this view, one can show that, 1) the problem of estimating algebraic immunity and spectral immunity is closely connected to determining low-weight codewords in cyclic codes, and 2) the least number  ...  Filter and combiner generators based on linear and nonlinear feedback shift registers are typical examples of such.  ... 
doi:10.1109/ita.2011.5743578 dblp:conf/ita/HellesethR11 fatcat:37elv3fpdzg4tgdbn5hm2tmv7e

Security analysis of linearly filtered NLFSRs

Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett
2013 Journal of Mathematical Cryptology  
We extend the attack on linear combinations of Linearly Filtered NLF-SRs as well.  ...  Our contributions are applying distinguishing attack on Linearly Filtered NLFSR as a primitive or associated with filter generators.  ...  We examine the security of LF-NLFSR, random LF-NLFSR and combination of LF-NLFSR and filter generators against distinguishing attack.  ... 
doi:10.1515/jmc-2013-5009 fatcat:a7sonsapdrgwtjtotjmrdphe6m

Transform Domain Analysis of Sequences [article]

Muhammad Asad Khan, Amir A Khan, Fauzan Mirza
2015 arXiv   pre-print
The time and frequency domain behavior of non-linear filter and combiner generators is discussed along with some novel observations based on the Chinese Remainder Theorem (CRT).  ...  The proposed approach is demonstrated on some examples of combiner generators and is scalable to general configuration of combiner generators.  ...  in the last stage of DFT spectral attacks attacks on combiner generators.  ... 
arXiv:1503.00943v2 fatcat:cjrh22b6tfbdtdr5id5rmguuau

Algebraic Techniques in Differential Cryptanalysis Revisited [chapter]

Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel
2011 Lecture Notes in Computer Science  
At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differential cryptanalysis. They introduced three new attacks, namely Attack A, Attack B and Attack C.  ...  Our work helps to understand which equations are important in the differential-algebraic attack. Based on our findings, we present two new differential-algebraic attacks.  ...  The authors would like thank the anonymous reviewers for their detailed comments and suggestions.  ... 
doi:10.1007/978-3-642-22497-3_9 fatcat:2zo7odfg6bebrd6lcldffvj3e4

Strengthening Crypto-1 Cipher Against Algebraic Attacks

Farah Afianti, Ari M. Barmawi
2015 Journal of ICT Research and Applications  
One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity.  ...  Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function.  ...  Acknowledgements We would like to express our gratitude to the director and all lecturers of Telkom University, especially at the Master Training Program of the Graduate School, and friends for their moral  ... 
doi:10.5614/itbj.ict.res.appl.2015.9.1.5 fatcat:cxu5k3oaufdvtbo2yh7en5jube

Extensions of the Cube Attack Based on Low Degree Annihilators [chapter]

Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk
2009 Lecture Notes in Computer Science  
2009) Extensions of the cube attack based on low degree annihilators. Abstract.  ...  At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector.  ...  We also did some experiments to find low degree implicit equations for the vectorial cube attack and got some results which are better than that expected by theory.  ... 
doi:10.1007/978-3-642-10433-6_7 fatcat:35lhd6lk5fezzcvs6lj6jpvgdi

Algebraic Attacks on Stream Ciphers with Linear Feedback [chapter]

Nicolas T. Courtois, Willi Meier
2003 Lecture Notes in Computer Science  
Our new general algebraic attack breaks stream ciphers satisfying all the previously known design criteria in at most the square root of the complexity of the previously known generic attack.  ...  A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f .  ...  Many thanks to Philip Hawkes, Josef Pieprzyk and the anonymous referees of Eurocrypt for their helpful comments.  ... 
doi:10.1007/3-540-39200-9_21 fatcat:jnfd2hey35eplnbmqahxhei5by

A different algebraic analysis of the ZUC stream cipher

Mufeed Juma ALMashrafi
2011 Proceedings of the 4th international conference on Security of information and networks - SIN '11  
Preliminary algebraic analysis of the ZUC cipher indicates that the cipher may be vulnerable to algebraic attack.  ...  In this paper we present an alternative algebraic analysis method for the ZUC stream cipher, using a combiner to represent the nonlinear function.  ...  ALGEBRAIC ATTACK Algebraic attacks on symmetric ciphers were first applied to block ciphers in 2002 [6] and then to stream ciphers in 2003 [5] .  ... 
doi:10.1145/2070425.2070455 dblp:conf/sin/AlMashrafi11 fatcat:jyp63j6j7ng5hf3pwkax4ycwca

A Stream Cipher Algorithm based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

Aissa Belmeguenai, Mohammed Redjimi, Nadir Derouiche
2012 International Journal of Computer Applications  
attack, correlation attack and algebraic attack.  ...  This paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image.  ...  Algebraic Attack In the algebraic attacks, the system is rewritten in the form of a nonlinear system of equations between the output of the filtering function f and its inputs in the following way: ) (  ... 
doi:10.5120/8855-2807 fatcat:gqht2qzhqrbsdja5bwiwibsj4i

Cryptanalysis of alternating step generators

Robert Wicik, Rafal Gliwa, Piotr Komorowski
2015 2015 International Conference on Military Communications and Information Systems (ICMCIS)  
The analysis of the best known attacks on the alternating step generator led us to add nonlinear filtering functions and the nonlinear scrambler to the construction.  ...  In this paper we give complexities of these attacks applied to the modified alternating step generator with nonlinear filters and the scrambler.  ...  We concentrated on selecting proper nonlinear functions -ones as feedback functions and other ones as filtering and combining functions of shift registers.  ... 
doi:10.1109/icmcis.2015.7158683 fatcat:ap63hp5kpbhyzmwkhnnx5srlwu
« Previous Showing results 1 — 15 out of 11,119 results