Abstract
The application of a nonlinear filtering function to a Linear Feedback Shift Register (LFSR) is a general technique for designing pseudorandom sequence generators with cryptographic application. In this paper, we investigate the equivalence between different nonlinear filtering functions applied to distinct LFSRs. It is a well known fact that given a binary sequence generated from a pair (nonlinear filtering function, LFSR), the same sequence can be generated from any other LFSR of the same length by using another filtering function. However, until now no solution has been found for the problem of computing such an equivalent. This paper analyzes the specific case in which the reciprocal LFSR of a given register is used to generate an equivalent of the original nonlinear filtering function. The main advantage of the contribution is that weaker equivalents can be computed for any nonlinear filter, in the sense that such equivalents could be used to cryptanalyze apparently secure generators. Consequently, to evaluate the cryptographic resistance of a sequence generator, the weakest equivalent cipher should be determined and not only a particular instance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Biryukov, A., Shamir, A.: Cryptanalytic time/Memory/Data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392–407. Springer, Heidelberg (2000)
eSTREAM: the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/
Faugere, J.-C., Ars, G.: An Algebraic Cryptanalysis of Nonlinear Filter Generators using Grobner bases (2003), http://www.inria.fr/rrrt/rr-4739.html
Filiol, E.: Decimation attack of stream ciphers. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 31–42. Springer, Heidelberg (2000)
Fúster-Sabater, A., Caballero-Gil, P.: On the linear complexity of nonlinearly filtered pn-sequences. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 80–90. Springer, Heidelberg (1995)
Games, R.A., Rushanan, J.J.: Blind synchronization of m-sequences with even span. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 168–180. Springer, Heidelberg (1994)
Garey, M.R., Johnson, D.S.: Computers and Interactability. Freeman and Company (1979)
Golic, J.D., Clark, A., Dawson, E.: Generalized inversion attack on nonlinear filter generators. IEEE Transactions on Computers 49(10), 1100–1109 (2000)
Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)
Hell, M., Johansson, T., Meier, W.: Grain - A Stream Cipher for Constrained Environments (2005), http://www.ecrypt.eu.org/stream/p3ciphers/grain/Grain_p3.pdf
Key, E.L.: An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory 22(6), 732–736 (1976)
Lohlein, B.: Design and analysis of cryptographic secure keystream generators for stream cipher encryption. PhD thesis, Faculty of Electrical and Information Engineering, University of Hagen, Germany (2001)
Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Transactions on Information Theory IT-15(1), 122–127 (1969)
Meier, W., Staffelbach, O.J.: Fast correlation attacks on stream ciphers. Journal of Cryptology 1(3), 159–176 (1989)
Pasalic, E.: On guess and determine cryptanalysis of LFSR-based stream ciphers. IEEE Transactions on Information Theory 55(7), 3398–3406 (2009)
Rønjom, S., Cid, C.: Nonlinear equivalence of stream ciphers. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 40–54. Springer, Heidelberg (2010)
Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer (1986)
Schneider, M.: Methods of generating binary pseudo-random sequences for stream cipher encryption. PhD thesis, Faculty of Electrical Engineering, University of Hagen, Germany (1999)
Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Transactions on Computers 100(1), 81–85 (1985)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Fúster-Sabater, A., Caballero-Gil, P. (2014). Weak Equivalents for Nonlinear Filtering Functions. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2014. ICCSA 2014. Lecture Notes in Computer Science, vol 8584. Springer, Cham. https://doi.org/10.1007/978-3-319-09153-2_44
Download citation
DOI: https://doi.org/10.1007/978-3-319-09153-2_44
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09152-5
Online ISBN: 978-3-319-09153-2
eBook Packages: Computer ScienceComputer Science (R0)