Designs, Codes and Cryptography

, Volume 35, Issue 1, pp 5–19 | Cite as

Vectorial Approach to Fast Correlation Attacks

  • Jovan DJ. GolićEmail author
  • Philip Hawkes


A new, vectorial approach to fast correlation attacks on binary memoryless combiners is proposed. Instead of individual input sequences or their linear combinations, the new attack is targeting subsets of input sequences as a whole thus exploiting the full correlation between the chosen subset and the output sequence. In particular, the set of all the input sequences can be chosen as the target. The attack is based on a novel iterative probabilistic algorithm which is also applicable to general memoryless combiners over finite fields or finite rings. To illustrate the effectiveness of the introduced approach, experimental results obtained for random balanced combining functions are presented


vectorial correlation attack linear cryptanalysis iterative probabilistic decoding finite fields nonlinear filter generator 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Chepyzhov, V., Johansson, T., Smeets, B., simple, A 2001algorithm for fast correlation attacks on stream ciphers Fast Software Encryption - FSE 2000Lecture Notes in Comput. Sci.1978181195Google Scholar
  2. Chose, P., Joux, A., Mitton, M. 2002Fast correlation attacks: An algorithmic point of viewAdvances in Cryptology - EUROCRYPT 2002, Lecture Notes in Comput. Sci.2332209221MathSciNetGoogle Scholar
  3. Clark, G.C.,Jr, Cain, J.B. 1982Error-Correcting Coding for Digital CommunicationsPlenum PressNew YorkGoogle Scholar
  4. Fossorier, M.P.C., Mihaljević, M.J., Imai, H. 1999Reduced complexity iterative decoding of low-density parity check codes based on belief propagationIEEE Trans. Commun.47673680Google Scholar
  5. Gallager, R.G. 1962Low-density parity-check codesIRE Trans. Inf. Theory82128MathSciNetGoogle Scholar
  6. Golić, J.Dj. 1996Fast low order approximation of cryptographic functions, Advances in Cryptology - EUROCRYPT ‘96Lecture Notes in Comput. Sci.1070268282Google Scholar
  7. Golić, J.Dj. 1996Computation of low-weight parity-check polynomialsElectron. Lett.3219811982Google Scholar
  8. Golić, J.Dj. 1996Iterative optimum symbol-by-symbol decoding and fast correlation attacksIEEE Trans. Inf. Theory4730403049Google Scholar
  9. Hartmann, C.R.P., Rudolph, L.D. 1976An optimum symbol-by-symbol decoding rule for linear codesIEEE Trans. Inf. Theory22514517zbMATHMathSciNetGoogle Scholar
  10. Johansson, T., Jonnson, F. 1999Improved fast correlation attacks on stream ciphers via convolutional codes Advances in Cryptology - EUROCRYPT ‘99Lecture Notes in Comput. Sci.1592347362Google Scholar
  11. Massey, J.L. 1963Threshold DecodingMIT PressCambridge, MAGoogle Scholar
  12. Meier, W., Staffelbach, O. 1989Fast correlation attacks on certain stream ciphersJ. Cryptol.1159176zbMATHMathSciNetGoogle Scholar
  13. Mihaljević, M. J., Golić, J.Dj. 1991A comparison of cryptanalytic principles based on iterative error-correction, Advances in Cryptology - EUROCRYPT ‘91Lecture Notes in Comput. Sci.547527531Google Scholar
  14. Mihaljević, M.J., Fossorier, M.P.C., Imai, H., low-complexity, A 2001and high-performance algorithm for the fast correlation attackFast Software Encryption - FSE 2000Lecture Notes in Comput. Sci.1978196212Google Scholar
  15. Mihaljević, M.J., Fossorier, M.P.C., Imai, H. 2002Fast correlation attack algorithm with the list decoding and an application Fast Software Encryption - FSE 2001Lecture Notes in Comput. Sci.2355196210CrossRefGoogle Scholar
  16. Mihaljević, M.J., Fossorier, M.P.C., Imai, H. 2001On decoding techniques for cryptanalysis of certain encryption algorithmsIEICE Trans. FundamentalsE84-A919930Google Scholar
  17. Siegenthaler, T. 1985Decrypting a class of stream ciphers using ciphertext onlyIEEE Trans. Comput.348185Google Scholar
  18. Zeng, K., Huang, M. 1990On the linear syndrome method in cryptanalysisAdvances in Cryptology - CRYPTO ‘88, Lecture Notes in Comput. Sci.403469478MathSciNetGoogle Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  1. 1.Access Network and Terminals System DesignTelecom Italia LabTurinItaly
  2. 2.Qualcomm AustraliaGladesvilleAustralia

Personalised recommendations