Linearisation Attacks on FCSR-based Stream Ciphers

نویسنده

  • Arshad Ali
چکیده

This paper presents a new class of cryptanalytic attacks, which are applicable against those binary additive synchronous stream ciphers, whose analysis theory is based on the properties of 2-adic numbers. These attacks are named as ‘Linearisation Attacks’. Linearisation attacks consist of three variants, which are referred as ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Attacks (FLAs)’ and ‘Improved Linearisation Attacks (ILAs)’. The paper demonstrates, these new attacks against F-FCSR-H and an eSTREAM candidate F-FCSR-H v2 stream ciphers by presenting state recovery algorithms based on CLAs, FLAs and ILAs. The paper analyses the efficiency of these attacks in terms of data, time and memory complexities. The paper also presents a comparative analysis of these attacks, which shows that these variants provide a tradeoff of various complexity measures, i.e. data, time and memory complexities when compared with each other. Further more, the paper also presents a key recovery algorithm, which works in conjunction with the state recovery algorithms to recover the effective key used in these ciphers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode

Feedback with Carry Shift Registers (FCSRs) are a promising alternative to LFSRs for the design of stream ciphers. Most of the FCSR-based stream ciphers use a Galois representation. In this case, the control of a single bit leads to the control of the feedback values. This particular property was exploited to break most of the existing proposals. Recently, a new representation for FCSR automata...

متن کامل

Cryptanalysis of Selected Stream Ciphers

T he aim of this dissertation is to show some cryptanalytical results on a selection of stream ciphers. We have grouped theory and results into three main parts. The first part focuses on the FCSR-based constructions X-FCSR and F-FCSRH v3. For the X-FCSR family of stream ciphers we perform a severe state recovery attack. This attack works for both X-FCSR-128 and X-FCSR-256. We then develop a ge...

متن کامل

Two Algebraic Attacks Against the F-FCSRs Using the IV Mode

This article presents some new results concerning two algebraic attacks against the F-FCSR constructions proposed in [2]. We focus on the parameters of the stream ciphers proposed that permit to mount algebraic attacks when using the IV mode. The complexity obtained for the first attack described here is 2 binary instructions using 2 known IV values for the construction F-FCSR-SF1. All the prop...

متن کامل

Cryptanalysis of the F-FCSR Stream Cipher Family

This paper focuses on F-FCSR, a new family of stream ciphers proposed by Arnault and Berger at FSE 2005. It uses a non-linear primitive called the Feedback with Carry Shift Register (FCSR) as a building block. Its security relies on some properties of the 2-adic numbers. The F-FCSR family contains several stream ciphers, each of them proposing different features. First, we show a resynchronizat...

متن کامل

F-FCSR Stream Ciphers

Feedback with Carry Shift Registers (FCSRs) are a promising alternative to Linear Feedback Shift Registers (LFSRs) for the design of stream ciphers. The main difference between these two automata lies in the computation of the feedback. While LFSRs use simple bitwise addition, FCSRs use addition with carries. Hence, the transition function of an FCSR is non-linear, more precisely quadratic. Sin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012