The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers

نویسنده

  • Palash Sarkar
چکیده

We introduce a new model – the Filter-Combiner model – for memoryless synchronous stream ciphers. The new model combines the best features of the classical models for memoryless synchronous stream ciphers – the Nonlinear-Combiner model and the Nonlinear-Filter model. In particular, we show that the Filter-Combiner model provides key length optimal resistance to correlation attacks and eliminates weaknesses of the NF model such as the the Anderson leakage and the Inversion Attacks. Further, practical length sequences extracted from the Filter-Combiner model cannot be distinguished from true random sequences based on linear complexity test. We show how to realise the Filter-Combiner model using Boolean functions and cellular automata. In the process we point out an important security advantage of sequences obtained from cellular automata over sequences obtained from LFSRs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions

In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter function generators and filter cominers based on Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-data trade-off attack of Mihaljevic and Imai on Toyocrypt. First, we substitute the filter function in Toyocrypt (which has the same size as the LFSR) with a gen...

متن کامل

Fast Algebraic Attacks on Stream Ciphers with Linear Feedback

Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relation involving the key/state bits and the output bits. Recent papers by Courtois, Meier, Krause and Armknecht [1, 2, 10, 11] show that such relations exist for several well known constructions of stream ciphers immune t...

متن کامل

Stream ciphers and the eSTREAM project

Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.

متن کامل

Convolutional Codes based FCA when Combiner Function is 1-CI

Convolution Code based Fast Correlation Attacks (FCA) are a powerful class of attacks on stream ciphers. Thus stream ciphers are designed so that combiner function is correlation immune. In this paper we propose a method to apply Convolution Code based FCA when the combiner function is first order correlation immune (1-CI) but not 2-CI. We apply the attack on a pair of LFSRs whose sum sequence ...

متن کامل

A Filter Bank View of Block and Stream Ciphers

Vaidyanathan suggested the use of filter banks with coefficients in finite fields as stream ciphers. We show how to break those ciphers. A more general class of ciphers is introduced, which includes many well-known block ciphers, like DES, IDEA, etc. These ciphers are derived from filter banks over group rings.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002