Observer Attack on Stream Ciphers

被引:0
|
作者
Anantharaman, Ramachandran [1 ]
Sule, Virendra [1 ]
机构
[1] Indian Inst Technol, Dept Elect Engn, Mumbai, Maharashtra, India
来源
IFAC PAPERSONLINE | 2022年 / 55卷 / 30期
关键词
Stream ciphers; Cryptanalysis; Boolean Dynamical Systems; Observer Design; Koopman Operator;
D O I
10.1016/j.ifacol.2022.11.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an application of a new observer theory for non-linear systems developed previously to solve the Cryptanalysis problem of a special class of pseudorandom generators which are commonly used in Cryptography. The Crypt analysis problem addressed here is that of the recovery of internal state of the non-linear dynamic stream generator from the output stream. The proposed methodology is termed as observability attack. It is also shown that for a special class of generators, the computations are of complexity O(D-4) in pre-computation and of O(D) for online computation, where D = Sigma(d)(i=0) ((n)(i)) for this class of stream generators with n states and d the degree of the output function. The attack is technically applicable over general finite fields as well as most dynamic systems arising from models of stream ciphers and appropriate bounds on computation are estimated. From these complexity bounds, it follows that this attack is feasible in realistic cases and gives important estimates of time and memory resources required for Cryptanalysis of a class of stream ciphers. Copyright (C) 2022 The Authors.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [31] An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
    Stankovski, Paul
    Hell, Martin
    Johansson, Thomas
    JOURNAL OF CRYPTOLOGY, 2014, 27 (01) : 1 - 22
  • [32] Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
    邹敏辉
    马坤
    吴剀劼
    沙行勉
    Journal of Computer Science & Technology, 2014, 29 (04) : 646 - 655
  • [33] Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
    Min-Hui Zou
    Kun Ma
    Kai-Jie Wu
    Edwin Hsing-Mean Sha
    Journal of Computer Science and Technology, 2014, 29 : 646 - 655
  • [34] An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
    Paul Stankovski
    Martin Hell
    Thomas Johansson
    Journal of Cryptology, 2014, 27 : 1 - 22
  • [35] Scan-based side channel attack on stream ciphers and its prevention
    Sandip Karmakar
    Dipanwita Roy Chowdhury
    Journal of Cryptographic Engineering, 2018, 8 : 327 - 340
  • [36] Scan-based side channel attack on stream ciphers and its prevention
    Karmakar, Sandip
    Chowdhury, Dipanwita Roy
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (04) : 327 - 340
  • [37] Chosen ciphertext attack on a new class of self-synchronizing stream ciphers
    Zhang, B
    Wu, HJ
    Feng, DG
    Bao, F
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 73 - 83
  • [38] A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
    Chakraborty, Abhishek
    Mazumdar, Bodhisatwa
    Mukhopadhyay, Debdeep
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (12) : 1968 - 1977
  • [39] STREAM CIPHERS.
    Piper, Fred
    Elektrotechnik und Maschinenbau, 1987, 104 (12): : 564 - 568
  • [40] Kolmogorov Stream Ciphers
    Scharinger, Josef
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 1 - 8