Observer Attack on Stream Ciphers

被引:0
|
作者
Anantharaman, Ramachandran [1 ]
Sule, Virendra [1 ]
机构
[1] Indian Inst Technol, Dept Elect Engn, Mumbai, Maharashtra, India
来源
IFAC PAPERSONLINE | 2022年 / 55卷 / 30期
关键词
Stream ciphers; Cryptanalysis; Boolean Dynamical Systems; Observer Design; Koopman Operator;
D O I
10.1016/j.ifacol.2022.11.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an application of a new observer theory for non-linear systems developed previously to solve the Cryptanalysis problem of a special class of pseudorandom generators which are commonly used in Cryptography. The Crypt analysis problem addressed here is that of the recovery of internal state of the non-linear dynamic stream generator from the output stream. The proposed methodology is termed as observability attack. It is also shown that for a special class of generators, the computations are of complexity O(D-4) in pre-computation and of O(D) for online computation, where D = Sigma(d)(i=0) ((n)(i)) for this class of stream generators with n states and d the degree of the output function. The attack is technically applicable over general finite fields as well as most dynamic systems arising from models of stream ciphers and appropriate bounds on computation are estimated. From these complexity bounds, it follows that this attack is feasible in realistic cases and gives important estimates of time and memory resources required for Cryptanalysis of a class of stream ciphers. Copyright (C) 2022 The Authors.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [21] Correlation Power Analysis Attack against Synchronous Stream Ciphers
    Wu, Keke
    Li, Huiyun
    Peng, Bo
    Yu, Fengqi
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2067 - +
  • [22] Generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
    Golic, Jovan Dj.
    Mihaljevic, Miodrag J.
    Journal of Cryptology, 1991, 3 (03) : 201 - 212
  • [23] A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
    Yang, Wenfeng
    Hu, Yupu
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (02): : 158 - 162
  • [24] RESYNCHRONIZATION ATTACK ON STREAM CIPHERS FILTERED BY MAIORANA-MCFARLAND FUNCTIONS
    Chew, Guanhan
    Zhang, Aileen
    Khoo, Khoongming
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 159 - 162
  • [25] The rainbow attack on stream ciphers based on Maiorana-McFarland functions
    Khoo, Khoongming
    Gong, Guang
    Lee, Hian-Kiat
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 194 - 209
  • [26] A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
    Wenfeng Yang
    Yupu Hu
    Frontiers of Computer Science in China, 2011, 5 : 158 - 162
  • [27] An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures
    Bijoy Das
    Amit Sardar
    Swapan Maiti
    Abhijit Das
    Dipanwita Roy Chowdhury
    Journal of Hardware and Systems Security, 2021, 5 (3-4) : 191 - 207
  • [28] New design of LFSR based stream ciphers to resist power attack
    Zhao, Yongbin
    Hu, Yupu
    Jia, Yanyan
    Zhao, Y. (zhaoyb@stdu.edu.cn), 2013, Science Press (40): : 172 - 179
  • [29] STREAM CIPHERS
    PIPER, F
    LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 181 - 188
  • [30] Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
    Zou, Min-Hui
    Ma, Kun
    Wu, Kai-Jie
    Sha, Edwin Hsing-Mean
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (04) : 646 - 655