Discrete Optimisation and Fast Correlation Attacks

نویسندگان

  • Jovan Dj. Golic
  • Mahmoud Salmasizadeh
  • Andrew J. Clark
  • Abdollah Khodkar
  • Ed Dawson
چکیده

Modifications to fast correlation attacks on stream ciphers are investigated. Improvements are achieved with both deterministic and random choices for updates of the corresponding posterior probabilities and with fast and partial resetting methods. The use of simulated annealing and appropriate optimisation heuristics is also proposed and successful experimental results are obtained. It is shown that a search for error-free information sets is a necessary technique to be applied after the iterative error-correction algorithms to deal with high noise probabilities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Emergency department resource optimisation for improved performance: a review

Emergency departments (EDs) have been becoming increasingly congested due to the combined impacts of growing demand, access block and increased clinical capability of the EDs. This congestion has known to have adverse impacts on the performance of the healthcare services. Attempts to overcome with this challenge have focussed largely on the demand management and the application of system wide p...

متن کامل

Digital Image Watermarking Against Desynchronization Attacks

1 Digital Image Watermarking Against Desynchronization Attacks M Selin Department of Computer Science,KMEA Engineering College,Edathala Aluva, Kerala ABSTRACT Fast and massive dissemination of image data across the Internet imposes great challenges of protecting images against illegal access and unauthorized reproduction. Image watermarking provides a powerful solution for intellectual protecti...

متن کامل

Correlation Attacks on Stream Cipher

Correlation attacks on stream cipher are divide and conquer attacks applied to nonlinear combination generators based on linear feedback shift registers. These are cipher text only attacks that exploit the correlation between the cipher text and the underlying shift register sequences to recover the initial state of the underlying LFSRs. Fast correlation attacks are based on use of parity check...

متن کامل

Improved Fast Correlation Attacks Using Parity-Check Equations

This paper describes new techniques for fast correlation attacks, based on Gallager iterative decoding algorithm using parity-check equations of weight greater than 3. These attacks can be applied to any key-stream generator based on LFSRs and it does not require that the involved feedback polynomial have a low weight. We give a theoretical analysis of all fast correlation attacks, which shows ...

متن کامل

Fast Correlation Attacks: Methods and Countermeasures

Fast correlation attacks have considerably evolved since their first appearance. They have lead to new design criteria of stream ciphers, and have found applications in other areas of communications and cryptography. In this paper, a review of the development of fast correlation attacks and their implications on the design of stream ciphers over the past two decades is given.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995