Skip to main content

Weak Equivalents for Nonlinear Filtering Functions

  • Conference paper
Computational Science and Its Applications – ICCSA 2014 (ICCSA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8584))

Included in the following conference series:

Abstract

The application of a nonlinear filtering function to a Linear Feedback Shift Register (LFSR) is a general technique for designing pseudorandom sequence generators with cryptographic application. In this paper, we investigate the equivalence between different nonlinear filtering functions applied to distinct LFSRs. It is a well known fact that given a binary sequence generated from a pair (nonlinear filtering function, LFSR), the same sequence can be generated from any other LFSR of the same length by using another filtering function. However, until now no solution has been found for the problem of computing such an equivalent. This paper analyzes the specific case in which the reciprocal LFSR of a given register is used to generate an equivalent of the original nonlinear filtering function. The main advantage of the contribution is that weaker equivalents can be computed for any nonlinear filter, in the sense that such equivalents could be used to cryptanalyze apparently secure generators. Consequently, to evaluate the cryptographic resistance of a sequence generator, the weakest equivalent cipher should be determined and not only a particular instance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biryukov, A., Shamir, A.: Cryptanalytic time/Memory/Data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392–407. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. eSTREAM: the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/

  4. Faugere, J.-C., Ars, G.: An Algebraic Cryptanalysis of Nonlinear Filter Generators using Grobner bases (2003), http://www.inria.fr/rrrt/rr-4739.html

  5. Filiol, E.: Decimation attack of stream ciphers. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 31–42. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Fúster-Sabater, A., Caballero-Gil, P.: On the linear complexity of nonlinearly filtered pn-sequences. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 80–90. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  7. Games, R.A., Rushanan, J.J.: Blind synchronization of m-sequences with even span. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 168–180. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  8. Garey, M.R., Johnson, D.S.: Computers and Interactability. Freeman and Company (1979)

    Google Scholar 

  9. Golic, J.D., Clark, A., Dawson, E.: Generalized inversion attack on nonlinear filter generators. IEEE Transactions on Computers 49(10), 1100–1109 (2000)

    Article  Google Scholar 

  10. Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)

    Google Scholar 

  11. Hell, M., Johansson, T., Meier, W.: Grain - A Stream Cipher for Constrained Environments (2005), http://www.ecrypt.eu.org/stream/p3ciphers/grain/Grain_p3.pdf

  12. Key, E.L.: An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory 22(6), 732–736 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  13. Lohlein, B.: Design and analysis of cryptographic secure keystream generators for stream cipher encryption. PhD thesis, Faculty of Electrical and Information Engineering, University of Hagen, Germany (2001)

    Google Scholar 

  14. Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Transactions on Information Theory IT-15(1), 122–127 (1969)

    Article  MathSciNet  Google Scholar 

  15. Meier, W., Staffelbach, O.J.: Fast correlation attacks on stream ciphers. Journal of Cryptology 1(3), 159–176 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  16. Pasalic, E.: On guess and determine cryptanalysis of LFSR-based stream ciphers. IEEE Transactions on Information Theory 55(7), 3398–3406 (2009)

    Article  MathSciNet  Google Scholar 

  17. Rønjom, S., Cid, C.: Nonlinear equivalence of stream ciphers. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 40–54. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  18. Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer (1986)

    Google Scholar 

  19. Schneider, M.: Methods of generating binary pseudo-random sequences for stream cipher encryption. PhD thesis, Faculty of Electrical Engineering, University of Hagen, Germany (1999)

    Google Scholar 

  20. Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Transactions on Computers 100(1), 81–85 (1985)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Fúster-Sabater, A., Caballero-Gil, P. (2014). Weak Equivalents for Nonlinear Filtering Functions. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2014. ICCSA 2014. Lecture Notes in Computer Science, vol 8584. Springer, Cham. https://doi.org/10.1007/978-3-319-09153-2_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09153-2_44

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09152-5

  • Online ISBN: 978-3-319-09153-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics