Improved Fast Correlation Attack Using Multiple Linear Approximations and Its Application on SOSEMANUK

被引:0
|
作者
Ma, Sudong [1 ]
Jin, Chenhui [1 ]
Guan, Jie [1 ]
Cui, Ting [1 ]
Shi, Zhen [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Dept Appl Math, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Correlation; Linear approximation; Ciphers; Complexity theory; Time complexity; Vectors; Snow; Stream ciphers; fast correlation attack; SOSEMANUK; multiple linear approximations;
D O I
10.1109/TIT.2024.3409331
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At CRYPTO 2018, Todo et al. proposed an effective fast correlation attack using multiple linear approximations, and gave effective attacks on the Grain-like stream ciphers with the same size of LFSR and key. However, many stream ciphers require that the size of LFSR must be at least twice the key size. For this type of stream ciphers, we propose an improved fast correlation attack using multiple linear approximations. The main idea is to reduce the number of attacked bits of parity-check equations by XORing the same linear approximation at different clocks, and then further bypass some unknown variables of parity-check equations by multiple linear approximations with an expected probability. Finally, full unknown variables are recovered by solving systems of linear equations. SOSEMANUK is one of the finalists in the eSTREAM project. The best absolute correlation of linear approximations of SOSEMANUK we found is 2-20.84, which improves the linear approximations with current best absolute correlation of 2-21.41. Finally, the improved fast correlation attack method is applied to SOSEMANUK, and a fast correlation attack with time/data/memory complexity of O(2(139.75))/O(2(139.37)/O(2(139.37)) is given, and the success probability is 0.99. It improves the current best fast correlation attack with time/data/memory complexity of O(2(147.88))/O(2(145.5))/O(2(147.1)) (ASIACRYPT 2008). For the optional key size ranging from 128-bit to 256-bit of SOSEMANUK, our attack result shows that SOSEMANUK can only guarantee the security of 139-bit key. In addition, we declare that our new fast correlation attack method can be applied to the linear analysis of other LFSR-based stream ciphers.
引用
收藏
页码:7484 / 7497
页数:14
相关论文
共 50 条
  • [1] Linear attack using multiple linear approximations
    Choi, J
    Hong, DK
    Hong, SH
    Lee, SJ
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01): : 2 - 8
  • [2] Fast correlation attacks and multiple linear approximations
    Salmasizadeh, M
    Simpson, L
    Golic, JD
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 228 - 239
  • [3] Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher
    Zhang, Bin
    Liu, Ruitao
    Gong, Xinxin
    Jiao, Lin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (04) : 83 - 111
  • [4] Improved fast correlation attack using low rate codes
    Molland, Håvard
    Mathiassen, John Erik
    Helleseth, Tor
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2898 : 67 - 81
  • [5] Improved fast correlation attack using low rate codes
    Molland, H
    Mathiassen, JE
    Helleseth, T
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 67 - 81
  • [6] An Improved Fast Correlation Attack on Stream Ciphers
    Zhang, Bin
    Feng, Dengguo
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 214 - +
  • [7] An Improved Algorithm for Fast Correlation Attack on Stream Ciphers
    Wanzhi Chen
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2126 - 2129
  • [8] An improved fast correlation attack based on list decoding
    Mihaljevic, MJ
    Fossorier, MPC
    Imai, H
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 165 - 165
  • [9] A fast calculus for the linearizing attack and its application to an attack on KASUMI
    Sugio, N
    Nambu, S
    Kaneko, T
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2006, 3857 : 163 - 172
  • [10] Fast correlation attack algorithm with list decoding and an application
    Mihaljevic, MJ
    Fossorier, MPC
    Imai, H
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 196 - 210