Improved Algorithm to Find Equations for Algebraic Attacks for Combiners with Memory

نویسندگان

  • Frederik Armknecht
  • Pierre-Louis Cayrel
  • Philippe Gaborit
  • Olivier Ruatta
چکیده

Algebraic attacks have established as an important tool for cryptanalyzing LFSR-based keystream generators. Crucial for an efficient attack is to find appropriate equations of a degree as low as possible. Hereby, lower degrees are possible if many keystream bits are involved in one equation. An example is the keystream generator E0 employed in Bluetooth, where equations of degree 4 exist for r = 4 and 5 clocks but equations of degree 3 for r ≈ 8, 822, 188. The existence of degree 3 equations with 5 < r 8, 822, 188 clocks remained an open question. It is known that valid equations correspond to annihilators of certain sets. The effort to compute the sets and to find annihilators on them are exponential in r, making efficient algorithms desirable. Most algorithms proposed so far used normal Gaussian elimination which has a cubic complexity. The only exception is the algorithm proposed recently in [3] which is quadratic. The results of this paper are as follows. First, we describe several improvements for computing the sets and their annihilators (the intersection method). Second, we use our new improvements to exclude the existence of degree 3 equations for E0 with 5 < r ≤ 9, which are the best results so far on the non-existence of low degree equations for E0. We also find new degree 4 annihilators which permit to reduce the number of bits of stream needed for the attack from 2 to 2.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Algebraic Attacks on Combiners with Memory

Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k, l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory bits. It is shown that for (k, l)-combiner...

متن کامل

On the Existence of low-degree Equations for Algebraic Attacks

Algebraic attacks on block ciphers and stream ciphers have gained more and more attention in cryptography. The idea is to express a cipher by a system of equations whose solution reveals the secret key. The complexity of an algebraic attack is closely related to the degree of the equations. Hence, low-degree equations are crucial for algebraic attacks. So far, the existence of low-degree equati...

متن کامل

Strengthening the E0 Keystream Generator against Correlation Attacks and Algebraic Attacks

Stream ciphers are widely used for online-encryption of arbitrarily long data. An important class of stream ciphers are combiners with memory, with the E0 generator from the Bluetooth standard for wireless communication [2] being their most prominent example. E0 consists of 4 driving devices, a finite state machine (FSM) C with a 4 bit state, an output function f and a memory update function δ....

متن کامل

Algebraic attacks on certain stream ciphers

To encrypt data streams of arbitrary lengths, keystream generators are used in modern cryptography which transform a secret initial value, called the key, into a long sequence of seemingly random bits. Many designs are based on linear feedback shift registers (LFSRs), which can be constructed in such a way that the output stream has optimal statistical and periodical properties and which can be...

متن کامل

Algebraic Attacks on Combiners with Memory and Several Outputs

Algebraic attacks on stream ciphers [9] recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based stream ciphers, when the output is obtained by a Boolean function, see [9– 11]. Recently this approach has been successfully extended also to combiners with memory, provided the number of memory bits is small, see [1, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007