Optimal correlation attack on the multiplexer generator

  • Authors:
  • Jovan Dj. Golić;Guglielmo Morgari

  • Affiliations:
  • Security Innovation, Telecom Italia, Via G. Reiss Romoli 274, 10148 Turin, Italy;Telsy Elettronica e Telecomunicazioni, Corso Svizzera 185, 10149 Turin, Italy

  • Venue:
  • Information Processing Letters
  • Year:
  • 2009

Quantified Score

Hi-index 0.89

Visualization

Abstract

The security of the well-known multiplexer generator with respect to correlation attacks on the data shift register is investigated. Apart from the basic correlation attack exploiting the bitwise correlation between the output sequence and any data input sequence, two new correlation attacks are introduced. One is based on computing the a posteriori probabilities and is statistically optimal, whereas the other makes use of the accumulated bitwise correlation to all data input sequences. It is theoretically argued and experimentally confirmed that the optimal attack requires a significantly shorter output sequence to be successful than the basic attack. The experiments also show that the less complex accumulated correlation attack requires a somewhat longer output sequence than the optimal attack.