Advertisement

Solving Binary Linear Equation Systems over the Rationals and Binaries

  • Benedikt Driessen
  • Christof Paar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7369)

Abstract

This paper presents intermediate results of our investigations into the potential of analog hardware for the purpose of solving linear equation (LES) systems which are of quadratic form and binary. Based on the assumption that we can efficiently solve binary LES over the rationals with sufficient precision, we present a generic method to map a rational solution to a solution which solves the equation system over \(\mathbb{F}_2\). We show that, in order to perform this mapping, we only need to look at two bits of the binary expansion of each of the elements of the rational solution vector.

Keywords

Equation System Input Voltage Rational Solution Binary Solution Stream Cipher 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [BBK03]
    Barkan, E., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600–616. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. [GNR08]
    Gendrullis, T., Novotný, M., Rupp, A.: A Real-World Attack Breaking A5/1 within Hours. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 266–282. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. [Gol97]
    Golić, J.D.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239–255. Springer, Heidelberg (1997)Google Scholar
  4. [LLMP93]
    Lenstra, A., Lenstra, H., Manasse, M., Pollard, J.: The number field sieve. In: The Development of the Number Field Sieve, pp. 11–42 (1993)Google Scholar
  5. [LS00]
    Lenstra, A.K., Shamir, A.: Analysis and Optimization of the TWINKLE Factoring Device. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 35–52. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  6. [PFS00]
    Petrovic, S., Fuster-Sabater, A.: Cryptanalysis of the A5/2 Algorithm. Technical report (2000), http://eprint.iacr.org/
  7. [PS00]
    Pornin, T., Stern, J.: Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 318–327. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  8. [Sha99]
    Shamir, A.: Factoring Large Numbers with the TWINKLE Device (Extended Abstract). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 2–12. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  9. [ST03]
    Shamir, A., Tromer, E.: Factoring Large Numbers with the TWIRL Device. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 1–26. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. [YP04]
    Yeung, T., Poon, E.: Binary decimal numbers and decimal numbers other than base ten. In: Proceedings of the International Conference on The Future of Mathematics Education (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Benedikt Driessen
    • 1
  • Christof Paar
    • 1
  1. 1.Horst-Goertz Institute for IT SecurityRuhr-University BochumGermany

Personalised recommendations