Improved Fast Correlation Attack Using Multiple Linear Approximations and Its Application on SOSEMANUK

被引:0
|
作者
Ma, Sudong [1 ]
Jin, Chenhui [1 ]
Guan, Jie [1 ]
Cui, Ting [1 ]
Shi, Zhen [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Dept Appl Math, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Correlation; Linear approximation; Ciphers; Complexity theory; Time complexity; Vectors; Snow; Stream ciphers; fast correlation attack; SOSEMANUK; multiple linear approximations;
D O I
10.1109/TIT.2024.3409331
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At CRYPTO 2018, Todo et al. proposed an effective fast correlation attack using multiple linear approximations, and gave effective attacks on the Grain-like stream ciphers with the same size of LFSR and key. However, many stream ciphers require that the size of LFSR must be at least twice the key size. For this type of stream ciphers, we propose an improved fast correlation attack using multiple linear approximations. The main idea is to reduce the number of attacked bits of parity-check equations by XORing the same linear approximation at different clocks, and then further bypass some unknown variables of parity-check equations by multiple linear approximations with an expected probability. Finally, full unknown variables are recovered by solving systems of linear equations. SOSEMANUK is one of the finalists in the eSTREAM project. The best absolute correlation of linear approximations of SOSEMANUK we found is 2-20.84, which improves the linear approximations with current best absolute correlation of 2-21.41. Finally, the improved fast correlation attack method is applied to SOSEMANUK, and a fast correlation attack with time/data/memory complexity of O(2(139.75))/O(2(139.37)/O(2(139.37)) is given, and the success probability is 0.99. It improves the current best fast correlation attack with time/data/memory complexity of O(2(147.88))/O(2(145.5))/O(2(147.1)) (ASIACRYPT 2008). For the optional key size ranging from 128-bit to 256-bit of SOSEMANUK, our attack result shows that SOSEMANUK can only guarantee the security of 139-bit key. In addition, we declare that our new fast correlation attack method can be applied to the linear analysis of other LFSR-based stream ciphers.
引用
收藏
页码:7484 / 7497
页数:14
相关论文
共 50 条
  • [21] FAST LINEAR PREDICTION AND ITS APPLICATION TO NMR-SPECTROSCOPY
    GESMAR, H
    HANSEN, PC
    JOURNAL OF MAGNETIC RESONANCE SERIES A, 1994, 106 (02) : 236 - 240
  • [22] A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
    Samajder, Subhabrata
    Sarkar, Palash
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 277 - 293
  • [23] A Convolution and Correlation Theorem for the Linear Canonical Transform and Its Application
    Wei, Deyun
    Ran, Qiwen
    Li, Yuanmin
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2012, 31 (01) : 301 - 312
  • [24] A Convolution and Correlation Theorem for the Linear Canonical Transform and Its Application
    Deyun Wei
    Qiwen Ran
    Yuanmin Li
    Circuits, Systems, and Signal Processing, 2012, 31 : 301 - 312
  • [25] Real-Time Attack-Recovery for Cyber-Physical Systems Using Linear Approximations
    Zhang, Lin
    Chen, Xin
    Kong, Fanxin
    Cardenas, Alvaro A.
    2020 IEEE 41ST REAL-TIME SYSTEMS SYMPOSIUM (RTSS), 2020, : 205 - 217
  • [26] Linear combination collusion attack and its application on an anti-collusion fingerprinting
    Wu, YD
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 13 - 16
  • [27] Fast attack detection using correlation and summarizing of security alerts in grid computing networks
    Raheel Hassan Syed
    Jasmina Pazardzievska
    Julien Bourgeois
    The Journal of Supercomputing, 2012, 62 : 804 - 827
  • [28] Application of Improved Multiple Linear Regression Method in Oilfield Output Forecasting
    Guo, Liang
    Deng, Xianghui
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 133 - +
  • [29] Fast attack detection using correlation and summarizing of security alerts in grid computing networks
    Syed, Raheel Hassan
    Pazardzievska, Jasmina
    Bourgeois, Julien
    JOURNAL OF SUPERCOMPUTING, 2012, 62 (02): : 804 - 827
  • [30] An improved fast fractal image compression using spatial texture correlation
    Wang Xing-Yuan
    Wang Yuan-Xing
    Yun Jiao-Jiao
    CHINESE PHYSICS B, 2011, 20 (10)