The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
نویسنده
چکیده
We introduce a new model – the Filter-Combiner model – for memoryless synchronous stream ciphers. The new model combines the best features of the classical models for memoryless synchronous stream ciphers – the Nonlinear-Combiner model and the Nonlinear-Filter model. In particular, we show that the Filter-Combiner model provides key length optimal resistance to correlation attacks and eliminates weaknesses of the NF model such as the the Anderson leakage and the Inversion Attacks. Further, practical length sequences extracted from the Filter-Combiner model cannot be distinguished from true random sequences based on linear complexity test. We show how to realise the Filter-Combiner model using Boolean functions and cellular automata. In the process we point out an important security advantage of sequences obtained from cellular automata over sequences obtained from LFSRs.
منابع مشابه
Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions
In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter function generators and filter cominers based on Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-data trade-off attack of Mihaljevic and Imai on Toyocrypt. First, we substitute the filter function in Toyocrypt (which has the same size as the LFSR) with a gen...
متن کاملFast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relation involving the key/state bits and the output bits. Recent papers by Courtois, Meier, Krause and Armknecht [1, 2, 10, 11] show that such relations exist for several well known constructions of stream ciphers immune t...
متن کاملStream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملConvolutional Codes based FCA when Combiner Function is 1-CI
Convolution Code based Fast Correlation Attacks (FCA) are a powerful class of attacks on stream ciphers. Thus stream ciphers are designed so that combiner function is correlation immune. In this paper we propose a method to apply Convolution Code based FCA when the combiner function is first order correlation immune (1-CI) but not 2-CI. We apply the attack on a pair of LFSRs whose sum sequence ...
متن کاملA Filter Bank View of Block and Stream Ciphers
Vaidyanathan suggested the use of filter banks with coefficients in finite fields as stream ciphers. We show how to break those ciphers. A more general class of ciphers is introduced, which includes many well-known block ciphers, like DES, IDEA, etc. These ciphers are derived from filter banks over group rings.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002