Advertisement

Fast correlation attacks and multiple linear approximations

  • M. Salmasizadeh
  • L. Simpson
  • J. Dj. Golić
  • E. Dawson
Cryptanalysis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1270)

Abstract

The fast correlation attack based on iterative probabilistic decoding is applied to nonlinear filter generators in order to investigate the effect of multiple linear transforms of the same linear recurring sequence being correlated to the keystream sequence. Systematic computer simulations on random balanced filter functions reveal that the attack is successful if the number of parity-checks used is sufficiently large given the correlation coefficient of the best affine approximation to the filter function. Nevertheless, the attack is more successful when applied to the independent correlation noise which appears in memoryless combiners where a multiple linear transform effect is not present. The experiments conducted show that the attack is successful on many publicly proposed filter functions and indicate that some bent filter functions may be easier to attack than the others.

Key words

Nonlinear filter generator Fast correlation attacks Multiple linear approximations Correlation coefficients 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    R. J. Anderson. Searching for optimum correlation attack. In Fast Software Encryption — Leuven '94, volume 1008 of Lecture Notes in Computer Science, pages 137–143. Springer-Verlag, 1995.Google Scholar
  2. 2.
    R. Forré. A fast correlation attack on nonlinearly filtered shift-register sequences. In J. J. Quisquater and J. Vandewalle, editors, Advances in Cryptology — CRYPTO '89, volume 434 of Lecture Notes in Computer Science, pages 586–595. Springer-Verlag, 1990.Google Scholar
  3. 3.
    J. Dj. Golić. Correlation via linear sequential circuit approximation of combiners with memory. In R. A. Rueppel, editor, Advances in Cryptology — EUROCRYPT '92, volume 658 of Lecture Notes in Computer Science, pages 113–123. Springer-Verlag, 1993.Google Scholar
  4. 4.
    J. Dj. Golić. Computation of low-weight parity-check polynomials. Electronics Letters, 32(21):1981–1982, 1996.CrossRefGoogle Scholar
  5. 5.
    J. Dj. Golić. On the security of nonlinear filter generators. In D. Gollmann, editor, Fast Software Encryption — Cambridge '96, volume 1039 of Lecture Notes in Computer Science, pages 173–188, 1996.Google Scholar
  6. 6.
    J. Dj. Golić, M. Salmasizadeh, A. Clark, A. Khodkar, and E. Dawson. Discrete optimisation and fast correlation attacks. In E. Dawson and J. Golić, editors, Cryptography: Policy and Algorithms, volume 1029 of Lecture Notes in Computer Science, pages 186–200. Springer-Verlag, 1996.Google Scholar
  7. 7.
    S. LEE, S. Chee, S. Park, and S. Park. Conditional correlation attack on nonlinear filter generators. In K. Kim and T. Matsumoto, editors, Advances in Cryptology — ASIACRYPT '96, volume 1163 of Lecture Notes in Computer Science, pages 360–367. Springer-Verlag, 1996.Google Scholar
  8. 8.
    W. Meier and O. Staffelbach. Correlation properties of combiners with memory in stream ciphers. Journal of Cryptology, 5(1):67–86, 1992.CrossRefMathSciNetGoogle Scholar
  9. 9.
    R. Rueppel. Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin, 1986.Google Scholar
  10. 10.
    H. Schildt. C the Complete Reference. Osborne McGraw-Hill, Berkeley, CA, 1990.Google Scholar
  11. 11.
    T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Comput., C-34:81–85, January 1985.Google Scholar
  12. 12.
    T. Siegenthaler. Cryptanalyst's representation of nonlinearly filtered mi-sequences. In F. Pichler, editor, Advances in Cryptology — EUROCRYPT '85, volume 219 of Lecture Notes in Computer Science, pages 103–110. Springer-Verlag, 1986.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • M. Salmasizadeh
    • 1
  • L. Simpson
    • 1
  • J. Dj. Golić
    • 1
  • E. Dawson
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbane QAustralia

Personalised recommendations