Advertisement

The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters

  • Miodrag J. Mihaljević
  • Hideki Imai
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3352)

Abstract

This paper proposes an improved approach for cryptanalysis of keystream generators based on a composition of a linear finite state machine (LFSM) and nonlinear mapping. The main feature of the proposed approach is that it is based on identification and selection for further processing certain suitable positions in the given sample so that only the decimated sample elements are relevant for the attacking. In a number of scenarios this yields a significant gain in the performance sometimes at the expense of a longer sample required or/and the pre-processing cost. The proposed approach employs novel methods for constructing the underlying overdefined system of equations relevant for the attacks and solving the system under a set of the hypothesis. Oppositely to the previously reported methods, the proposed ones also identify and use certain characteristics of the LFSM state-transition matrix in order to reduce the nonlinearity of the system. The novel construction of the equations yields a possibility for the trade-off between the required sample, pre-processing and processing complexity of the cryptanalysis. The pre-processing phase of the developed algorithm for cryptanalysis yields a collection of the output bit positions which are suitable for reducing the equations nonlinearity. The processing phase employs the output bits from the identified collection and it includes an exhaustive search over a subset of the secret key bits.

Keywords

stream ciphers cryptanalysis algebraic attacks overdefined systems of equations decimation hypotheses testing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Camion, P., Mihaljević, M.J., Imai, H.: Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q). In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 196–213. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Chose, P., Joux, A., Mitton, M.: Fast correlation attacks: An algorithmic point of view. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 209–221. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  3. 3.
    Courtois, N.T.: Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 182–199. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Faugere, J.-Ch., Ars, G.: An algebraic cryptanalysis of nonlinear filter generators using Grobner bases (2003), Available on the web, http://www.inria.fr/rrrt/rr-4739.html
  7. 7.
    Hawkes, P., Rose, G.: Rewriting variables: the complexity of Fast algebraic attacks on stream ciphers. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 390–406. Springer, Heidelberg (2004)Google Scholar
  8. 8.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  9. 9.
    Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of Boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 474–491. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Mihaljević, M.J., Imai, H.: Cryptanalysis of TOYOCRYPT-HS1 stream cipher. IEICE Transactions on Fundamentals E85-A, 66–73 (2002)Google Scholar
  11. 11.
    Mihaljević, M.J., Kohno, R.: Cryptanalysis of fast encryption algorithm for multimedia FEA-M. IEEE Communications Letters 6, 382–384 (2002)CrossRefGoogle Scholar
  12. 12.
    Mihaljević, M.J., Fossorier, M.P.C., Imai, H.: Fast correlation attack algorithm with list decoding and an application. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 196–210. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Miodrag J. Mihaljević
    • 1
  • Hideki Imai
    • 2
  1. 1.Mathematical InstituteSerbian Academy of Sciences and ArtsBelgradeSerbia and Montenegro
  2. 2.Institute of Industrial ScienceUniversity of TokyoTokyoJapan

Personalised recommendations