An Improved Fast Correlation Attack on Stream Ciphers

被引:0
|
作者
Zhang, Bin [1 ]
Feng, Dengguo [2 ]
机构
[1] Univ Luxembourg, Lab Algorithm Cryptol & Secur, 6 Rue Coudenhove Kalergi, L-1359 Luxembourg, Luxembourg
[2] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100190, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Stream ciphers; Correlation attacks; Linear feedback shift register (LFSR); Shrinking generator; SHRINKING GENERATOR;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At Crypto'2000, Johansson and Jonsson proposed a fast correlation attack on stream ciphers based on the Coldreich-Rubinfeld-Sudan algorithm. In this paper we show that a combination of their approach with techniques for substituting keystream and evaluating parity-checks gives us the most efficient fast correlation attack known so far. An application of the new algorithm results in the first-known near-practical key recovery attack on the shrinking generator with the parameters suggested by Krawczyk in 1994, which was verified in the 40-bit data LFSR case for which the only previously known efficient attacks were distinguishing attacks.
引用
收藏
页码:214 / +
页数:3
相关论文
共 50 条
  • [31] Fast correlation attack on stream cipher ABC v3
    Zhang HaiNa
    Lin, Li
    Wang XiaoYun
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (07): : 936 - 947
  • [32] Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers
    Bodhisatwa Mazumdar
    Debdeep Mukhopadhyay
    Indranil Sengupta
    Cryptography and Communications, 2015, 7 : 35 - 69
  • [33] Fast correlation attack on stream cipher ABC v3
    HaiNa Zhang
    Lin Li
    XiaoYun Wang
    Science in China Series F: Information Sciences, 2008, 51 : 936 - 947
  • [34] Another Tradeoff Attack on Sprout-Like Stream Ciphers
    Zhang, Bin
    Gong, Xinxin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 561 - 585
  • [35] Internal State Recovery Attack on Stream Ciphers: Breaking BIVIUM
    Shahapure, Shravani
    Sule, Virendra
    Daruwala, R. D.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 34 - 49
  • [36] New Key Recovery Attack on the MICKEY Family of Stream Ciphers
    Ding, Lin
    Gu, Dawu
    Wang, Lei
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 239 - 249
  • [37] Cube Attack on Stream Ciphers using a Modified Linearity Test
    Srinivasan, Chungath
    Pillai, Utkarsh Umesan
    Lakshmy, K. V.
    Sethumadhavan, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 301 - 311
  • [38] Cube Attack on Trivium and A5/1 Stream Ciphers
    Islam, Saad
    Ul Hag, Inam
    2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 409 - 415
  • [39] Improved fast correlation attack using low rate codes
    Molland, Håvard
    Mathiassen, John Erik
    Helleseth, Tor
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2898 : 67 - 81
  • [40] Improved fast correlation attack using low rate codes
    Molland, H
    Mathiassen, JE
    Helleseth, T
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 67 - 81