A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation

This paper proposes a novel approach for cryptanalysis of certain cryptographic pseudorandom sequence (keystream) generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanaly...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Mihaljević, Miodrag J., Fossorier, Marc P. C., Imai, Hideki
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 214
container_issue
container_start_page 203
container_title
container_volume
creator Mihaljević, Miodrag J.
Fossorier, Marc P. C.
Imai, Hideki
description This paper proposes a novel approach for cryptanalysis of certain cryptographic pseudorandom sequence (keystream) generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis based on the following: Suppose certain B bits of the LFSM initial state as known and identify time instances where certain arguments of the nonlinear function depend only on these B bits and are equal to zero. As opposed to previously reported methods, the proposed one also identifies and uses certain characteristics of the LFSM state-transition matrix in order to reduce the nonlinearity of the system of overdefined equations employed in an algebraic attack scenario, or to reduce the noise introduced by the linearization of the nonlinear function which corrupts the linear equations employed in a correlation attack scenario.
doi_str_mv 10.1007/11617983_20
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_20457112</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>20457112</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-3902774ef92c84c1f955e28a00ffa5c3ab8fd1247d5ea5bdfe729c0fa7ed8f7d3</originalsourceid><addsrcrecordid>eNpVkDtPw0AQhI-XRAip-APXUFAY9h7mfKUJJCBFogBqa32PyMSxrTtT8O9zkBRQrWbm02o0hFwxuGUA6o6xe6Z0ISoOR2SmVSFyCYJJLuGYTFLIMiGkPvmXCXFKJiCAZ1pJcU4uYvwEAK40nxBb0qXrXMCWLvqw_WpxbPqO9p6W7drVARtDsbN0gXGk8z4EdyDKcUSzifQBo7M0GY_ONgbHJN5wO7QuGabZ_sKX5MxjG93scKfkY_H0Pn_OVq_Ll3m5ygbO9JgJnUop6bzmppCGeZ3njhcI4D3mRmBdeMu4VDZ3mNfWO8W1AY_K2cIrK6bkev93wGiw9QE708RqCKlH-E6jyVwxxhN3s-diirq1C1Xd95tYMah-Zq7-zCx2Kt5qWQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation</title><source>Springer Books</source><creator>Mihaljević, Miodrag J. ; Fossorier, Marc P. C. ; Imai, Hideki</creator><contributor>Imai, Hideki ; Lin, Shu ; Poli, Alain ; Fossorier, Marc P. C.</contributor><creatorcontrib>Mihaljević, Miodrag J. ; Fossorier, Marc P. C. ; Imai, Hideki ; Imai, Hideki ; Lin, Shu ; Poli, Alain ; Fossorier, Marc P. C.</creatorcontrib><description>This paper proposes a novel approach for cryptanalysis of certain cryptographic pseudorandom sequence (keystream) generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis based on the following: Suppose certain B bits of the LFSM initial state as known and identify time instances where certain arguments of the nonlinear function depend only on these B bits and are equal to zero. As opposed to previously reported methods, the proposed one also identifies and uses certain characteristics of the LFSM state-transition matrix in order to reduce the nonlinearity of the system of overdefined equations employed in an algebraic attack scenario, or to reduce the noise introduced by the linearization of the nonlinear function which corrupts the linear equations employed in a correlation attack scenario.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540314233</identifier><identifier>ISBN: 3540314237</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540314240</identifier><identifier>EISBN: 3540314245</identifier><identifier>DOI: 10.1007/11617983_20</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>algebraic attacks ; Applied sciences ; Computer science; control theory; systems ; cryptanalysis ; Cryptography ; decimation ; decoding ; Exact sciences and technology ; fast correlation attack ; Information, signal and communications theory ; keystream generators ; LFSRs ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; overdefined systems of nonlinear equations ; Signal and communications theory ; Software ; state transition matrix ; stream ciphers ; Telecommunications and information theory</subject><ispartof>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 2006, p.203-214</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2008 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11617983_20$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11617983_20$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=20457112$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Imai, Hideki</contributor><contributor>Lin, Shu</contributor><contributor>Poli, Alain</contributor><contributor>Fossorier, Marc P. C.</contributor><creatorcontrib>Mihaljević, Miodrag J.</creatorcontrib><creatorcontrib>Fossorier, Marc P. C.</creatorcontrib><creatorcontrib>Imai, Hideki</creatorcontrib><title>A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation</title><title>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes</title><description>This paper proposes a novel approach for cryptanalysis of certain cryptographic pseudorandom sequence (keystream) generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis based on the following: Suppose certain B bits of the LFSM initial state as known and identify time instances where certain arguments of the nonlinear function depend only on these B bits and are equal to zero. As opposed to previously reported methods, the proposed one also identifies and uses certain characteristics of the LFSM state-transition matrix in order to reduce the nonlinearity of the system of overdefined equations employed in an algebraic attack scenario, or to reduce the noise introduced by the linearization of the nonlinear function which corrupts the linear equations employed in a correlation attack scenario.</description><subject>algebraic attacks</subject><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>cryptanalysis</subject><subject>Cryptography</subject><subject>decimation</subject><subject>decoding</subject><subject>Exact sciences and technology</subject><subject>fast correlation attack</subject><subject>Information, signal and communications theory</subject><subject>keystream generators</subject><subject>LFSRs</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>overdefined systems of nonlinear equations</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>state transition matrix</subject><subject>stream ciphers</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540314233</isbn><isbn>3540314237</isbn><isbn>9783540314240</isbn><isbn>3540314245</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkDtPw0AQhI-XRAip-APXUFAY9h7mfKUJJCBFogBqa32PyMSxrTtT8O9zkBRQrWbm02o0hFwxuGUA6o6xe6Z0ISoOR2SmVSFyCYJJLuGYTFLIMiGkPvmXCXFKJiCAZ1pJcU4uYvwEAK40nxBb0qXrXMCWLvqw_WpxbPqO9p6W7drVARtDsbN0gXGk8z4EdyDKcUSzifQBo7M0GY_ONgbHJN5wO7QuGabZ_sKX5MxjG93scKfkY_H0Pn_OVq_Ll3m5ygbO9JgJnUop6bzmppCGeZ3njhcI4D3mRmBdeMu4VDZ3mNfWO8W1AY_K2cIrK6bkev93wGiw9QE708RqCKlH-E6jyVwxxhN3s-diirq1C1Xd95tYMah-Zq7-zCx2Kt5qWQ</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Mihaljević, Miodrag J.</creator><creator>Fossorier, Marc P. C.</creator><creator>Imai, Hideki</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation</title><author>Mihaljević, Miodrag J. ; Fossorier, Marc P. C. ; Imai, Hideki</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-3902774ef92c84c1f955e28a00ffa5c3ab8fd1247d5ea5bdfe729c0fa7ed8f7d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>algebraic attacks</topic><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>cryptanalysis</topic><topic>Cryptography</topic><topic>decimation</topic><topic>decoding</topic><topic>Exact sciences and technology</topic><topic>fast correlation attack</topic><topic>Information, signal and communications theory</topic><topic>keystream generators</topic><topic>LFSRs</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>overdefined systems of nonlinear equations</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>state transition matrix</topic><topic>stream ciphers</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mihaljević, Miodrag J.</creatorcontrib><creatorcontrib>Fossorier, Marc P. C.</creatorcontrib><creatorcontrib>Imai, Hideki</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mihaljević, Miodrag J.</au><au>Fossorier, Marc P. C.</au><au>Imai, Hideki</au><au>Imai, Hideki</au><au>Lin, Shu</au><au>Poli, Alain</au><au>Fossorier, Marc P. C.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation</atitle><btitle>Applied Algebra, Algebraic Algorithms and Error-Correcting Codes</btitle><date>2006</date><risdate>2006</risdate><spage>203</spage><epage>214</epage><pages>203-214</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540314233</isbn><isbn>3540314237</isbn><eisbn>9783540314240</eisbn><eisbn>3540314245</eisbn><abstract>This paper proposes a novel approach for cryptanalysis of certain cryptographic pseudorandom sequence (keystream) generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis based on the following: Suppose certain B bits of the LFSM initial state as known and identify time instances where certain arguments of the nonlinear function depend only on these B bits and are equal to zero. As opposed to previously reported methods, the proposed one also identifies and uses certain characteristics of the LFSM state-transition matrix in order to reduce the nonlinearity of the system of overdefined equations employed in an algebraic attack scenario, or to reduce the noise introduced by the linearization of the nonlinear function which corrupts the linear equations employed in a correlation attack scenario.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11617983_20</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 2006, p.203-214
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_20457112
source Springer Books
subjects algebraic attacks
Applied sciences
Computer science
control theory
systems
cryptanalysis
Cryptography
decimation
decoding
Exact sciences and technology
fast correlation attack
Information, signal and communications theory
keystream generators
LFSRs
Memory and file management (including protection and security)
Memory organisation. Data processing
overdefined systems of nonlinear equations
Signal and communications theory
Software
state transition matrix
stream ciphers
Telecommunications and information theory
title A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T14%3A55%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20General%20Formulation%20of%20Algebraic%20and%20Fast%20Correlation%20Attacks%20Based%20on%20Dedicated%20Sample%20Decimation&rft.btitle=Applied%20Algebra,%20Algebraic%20Algorithms%20and%20Error-Correcting%20Codes&rft.au=Mihaljevi%C4%87,%20Miodrag%20J.&rft.date=2006&rft.spage=203&rft.epage=214&rft.pages=203-214&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540314233&rft.isbn_list=3540314237&rft_id=info:doi/10.1007/11617983_20&rft_dat=%3Cpascalfrancis_sprin%3E20457112%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540314240&rft.eisbn_list=3540314245&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true