Weak Equivalents for Nonlinear Filtering Functions
The application of a nonlinear filtering function to a Linear Feedback Shift Register (LFSR) is a general technique for designing pseudorandom sequence generators with cryptographic application. In this paper, we investigate the equivalence between different nonlinear filtering functions applied to distinct LFSRs. It is a well known fact that given a binary sequence generated from a pair (nonlinear filtering function, LFSR), the same sequence can be generated from any other LFSR of the same length by using another filtering function. However, until now no solution has been found for the problem of computing such an equivalent. This paper analyzes the specific case in which the reciprocal LFSR of a given register is used to generate an equivalent of the original nonlinear filtering function. The main advantage of the contribution is that weaker equivalents can be computed for any nonlinear filter, in the sense that such equivalents could be used to cryptanalyze apparently secure generators. Consequently, to evaluate the cryptographic resistance of a sequence generator, the weakest equivalent cipher should be determined and not only a particular instance.
KeywordsNonlinear filtering function pseudorandom sequence LFSR stream cipher cryptography
Unable to display preview. Download preview PDF.
- 3.eSTREAM: the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/
- 4.Faugere, J.-C., Ars, G.: An Algebraic Cryptanalysis of Nonlinear Filter Generators using Grobner bases (2003), http://www.inria.fr/rrrt/rr-4739.html
- 8.Garey, M.R., Johnson, D.S.: Computers and Interactability. Freeman and Company (1979)Google Scholar
- 10.Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)Google Scholar
- 11.Hell, M., Johansson, T., Meier, W.: Grain - A Stream Cipher for Constrained Environments (2005), http://www.ecrypt.eu.org/stream/p3ciphers/grain/Grain_p3.pdf
- 13.Lohlein, B.: Design and analysis of cryptographic secure keystream generators for stream cipher encryption. PhD thesis, Faculty of Electrical and Information Engineering, University of Hagen, Germany (2001)Google Scholar
- 18.Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer (1986)Google Scholar
- 19.Schneider, M.: Methods of generating binary pseudo-random sequences for stream cipher encryption. PhD thesis, Faculty of Electrical Engineering, University of Hagen, Germany (1999)Google Scholar