Skip to main content

Decoding a Perturbed Sequence Generated by an LFSR

  • Conference paper
  • First Online:
Coding Theory and Applications (ICMCTA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10495))

Included in the following conference series:

  • 806 Accesses

Abstract

Given a sequence of bits produced by a linear feedback shift register (LFSR), the Berlekamp-Massey algorithm finds a register of minimal length able to generate the sequence. The situation is different when the sequence is perturbed; for instance, when it is sent through a transmission channel. LFSRs can be described as autonomous systems. A perturbed sequence of bits generated by an LFSR can be interpreted as a codeword in the binary linear code generated by the corresponding observability matrix. The problem of finding the original sequence can then be stated as the decoding problem, “given the received codeword, find the information transmitted”. We propose two decoding algorithms, one based on a brute force attack and the other one based on the representation technique of the syndromes introduced by Becker, Joux, May, and Meurer (2012).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ågren, M., Löndahl, C., Hell, M., Johansson, T.: A survey on fast correlation attacks. Crypt. Commun. 4(3–4), 173–202 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  2. Becker, A., Joux, A., May, A., Meurer, A.: Decoding random binary linear codes in 2n/20: how \(1+1=0\) improves information set decoding. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 520–536. Springer, Heidelberg (2012). doi:10.1007/978-3-642-29011-4_31

    Chapter  Google Scholar 

  3. Canteaut, A., Naya-Plasencia, M.: Correlation attacks on combination generators. Crypt. Commun. 4(3–4), 147–171 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  4. Chepyzhov, V.V., Johansson, T., Smeets, B.: A simple algorithm for fast correlation attacks on stream ciphers. In: Goos, G., Hartmanis, J., Leeuwen, J., Schneier, B. (eds.) FSE 2000. LNCS, vol. 1978, pp. 181–195. Springer, Heidelberg (2001). doi:10.1007/3-540-44706-7_13

    Chapter  Google Scholar 

  5. Geffe, P.: How to protect data with ciphers that are really hard to break. Electronics 46(1), 99–101 (1973)

    Google Scholar 

  6. Golić, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239–255. Springer, Heidelberg (1997). doi:10.1007/3-540-69053-0_17

    Google Scholar 

  7. Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)

    MATH  Google Scholar 

  8. Johansson, T., Jönsson, F.: Theoretical analysis of a correlation attack based on convolutional codes. IEEE Trans. Inf. Theory 48(8), 2173–2181 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  9. Kailath, T.: Linear Systems. Prentice-Hall, Upper Saddle River (1980)

    MATH  Google Scholar 

  10. Knuth, D.E.: The Art of Computer Programming. Sorting and Searching. Addison-Wesley, Boston (1998)

    MATH  Google Scholar 

  11. Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, New York (1986)

    MATH  Google Scholar 

  12. Lu, P., Huang, L.: A new correlation attack on LFSR sequences with high error tolerance. Prog. Comput. Sci. Appl. Logic 23, 67–83 (2004)

    MathSciNet  MATH  Google Scholar 

  13. Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory 15(1), 122–127 (1969)

    Article  MathSciNet  MATH  Google Scholar 

  14. Meier, W.: Fast correlation attacks: methods and countermeasures. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 55–67. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21702-9_4

    Chapter  Google Scholar 

  15. Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: Barstow, D., Brauer, W., Brinch Hansen, P., Gries, D., Luckham, D., Moler, C., Pnueli, A., Seegmüller, G., Stoer, J., Wirth, N., Günther, C.G. (eds.) EUROCRYPT 1988. LNCS, vol. 330, pp. 301–314. Springer, Heidelberg (1988). doi:10.1007/3-540-45961-8_28

    Google Scholar 

  16. Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. J. Cryptology 1(3), 159–176 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  17. Molland, H., Mathiassen, J.E., Helleseth, T.: Improved fast correlation attack using low rate codes. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 67–81. Springer, Heidelberg (2003). doi:10.1007/978-3-540-40974-8_7

    Chapter  Google Scholar 

  18. Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Comput. 34(1), 81–85 (1985)

    Article  Google Scholar 

  19. Zhang, B., Wu, H., Feng, D., Bao, F.: A fast correlation attack on the shrinking generator. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 72–86. Springer, Heidelberg (2005). doi:10.1007/978-3-540-30574-3_7

    Chapter  Google Scholar 

Download references

Acknowledgements

The first author was supported by FAPESP with number of process 2015/07246-0. The second author was partially supported by grants MIMECO MTM2015-68805-REDT and MTM2015-69138-REDT. The third author was partially supported by grants MINECO MTM2013-40960-P and MTM2015-68805-REDT.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joan-Josep Climent .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Cardell, S.D., Climent, JJ., Roca, A. (2017). Decoding a Perturbed Sequence Generated by an LFSR. In: Barbero, Á., Skachek, V., Ytrehus, Ø. (eds) Coding Theory and Applications. ICMCTA 2017. Lecture Notes in Computer Science(), vol 10495. Springer, Cham. https://doi.org/10.1007/978-3-319-66278-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66278-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66277-0

  • Online ISBN: 978-3-319-66278-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics