Breaking the F-FCSR-H Stream Cipher in Real Time
نویسندگان
چکیده
The F-FCSR stream cipher family has been presented a few years ago. Apart from some aws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. The hardware oriented version, called FCSR-H, is one of the ciphers selected for the eSTREAM portfolio. In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream cipher family. We give the details of the attack when applied on F-FCSR-H. The attack requires a few Mbytes of received sequence and the complexity is low enough to allow the attack to be performed on a single PC within seconds.
منابع مشابه
A generalized birthday approach for efficiently finding linear relations in ℓ-sequences
Feedback with Carry Shift Registers (FCSRs) have previously been available in two configurations, the Fibonacci and Galois architectures. Recently, a generalized and unifying FCSR structure and theory was presented. The new ring FCSRs model repairs some weaknesses of the older architectures. Most notably, the carry cell bias property that was exploited for an attack on the eSTREAM final portfol...
متن کاملOn the security of FCSR-based pseudorandom generators
This article describes new theoretical results concerning the general behavior of an FCSR automaton that allow to better understand the initial parameters that must be chosen to use this automaton as a basic block of a filtering stream cipher. The results demonstrated here especially concern the structure of the subjacent graph of an FCSR automaton, its entropy and the number of iterations of t...
متن کاملF-FCSR Stream Ciphers
Feedback with Carry Shift Registers (FCSRs) are a promising alternative to Linear Feedback Shift Registers (LFSRs) for the design of stream ciphers. The main difference between these two automata lies in the computation of the feedback. While LFSRs use simple bitwise addition, FCSRs use addition with carries. Hence, the transition function of an FCSR is non-linear, more precisely quadratic. Sin...
متن کاملLinearisation Attacks on FCSR-based Stream Ciphers
This paper presents a new class of cryptanalytic attacks, which are applicable against those binary additive synchronous stream ciphers, whose analysis theory is based on the properties of 2-adic numbers. These attacks are named as ‘Linearisation Attacks’. Linearisation attacks consist of three variants, which are referred as ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Atta...
متن کاملCryptanalysis of the F-FCSR Stream Cipher Family
This paper focuses on F-FCSR, a new family of stream ciphers proposed by Arnault and Berger at FSE 2005. It uses a non-linear primitive called the Feedback with Carry Shift Register (FCSR) as a building block. Its security relies on some properties of the 2-adic numbers. The F-FCSR family contains several stream ciphers, each of them proposing different features. First, we show a resynchronizat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008