NES / DOC / SAG / WP 3 / 019 / 2 y About the NESSIE Submission \ Using the general next bit predictor like an evaluation criteria " Markus Dichtl

نویسندگان

  • Markus Dichtl
  • Pascale Serf
چکیده

The submitters discuss an approach to measure the unpredictability of a pseudo-randomly generated key stream. They propose to use machine learning techniques: frames of a xed length from the bit stream together with the bit immediately following the frame are used as learning data for a classi cation algorithm. The idea is to assign the frames to two classes, namely the frames which are followed by 0 bits, and the frames followed by 1 bits. The submitters suggest to use the learning algorithm C4.5 by J. R. Quinlan. It seems to be used quite often for machine learning. C4.5 builds a decision tree from the learning data, and applies some heuristic simpli cations to the decision tree.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NESSIE Document NES/DOC/SAG/WP3/018/3∗† About the NESSIE Submission BMGL: Synchronous Key-stream Generator with Provable Security‡

• Using a hybrid argument for probability distributions it is shown that given an adversaryA who is capable of distinguishing the complete pseudorandom sequence (resulting from λ steps of the BMGL generator) from truely random bits (with advantage at least δ) there must exist a related adversary B and a fixed iteration i (of the one-way function f) such that B can distinguish the result of the ...

متن کامل

Linearity Properties of the SOBER-t32 Key Loading

In the course of the evaluation of the stream cipher SOBER-t32 submitted to NESSIE, a correlation between initial states has been found for related keys. With high probability some sums of bits of the initial state after key loading do not change their value when a bit of the key is inverted. This holds also for the loading of frame keys. It is shown that the required condition for the frame ke...

متن کامل

Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices

Alghoritms: HIEROCRYPT-3, CAMELLIA and ANUBIS, GRAND CRU, NOEKEON, NUSH, Q, RC6, SAFER++128, SC2000, SHACAL were requested for the submission of block ciphers (high level block cipher) to NESSIE (New European Schemes for Signatures, Integrity, and Encryption) project. The main purpose of this project was to put forward a portfolio of strong cryptographic primitives of various types. The NESSIE ...

متن کامل

On Noekeon NES/DOC/UIB/WP3/009/1

In this note we analyse Noekeon, a 128-bit block cipher submitted to the NESSIE project. It is shown that for six of seven S-boxes which satisfy the design criteria of the Noekeon designers the resulting block ciphers are vulnerable to either a differential attack, a linear attack or both. One conclusion is that Noekeon is not designed according to the wide trail strategy. Also, it is shown tha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001