Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Efficient Implementation of Cryptographically Useful 'Large' Boolean Functions
IEEE Transactions on Computers
Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces
Designs, Codes and Cryptography
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
Cryptanalysis of alleged A5 stream cipher
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
New applications of time memory data tradeoffs
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient representation and software implementation of resilient maiorana-mcfarland s-boxes
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Algebraic attacks on combiners with memory and several outputs
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Cryptographically resilient functions
IEEE Transactions on Information Theory
Linear codes in generalized construction of resilient functions with very high nonlinearity
IEEE Transactions on Information Theory
A construction of resilient functions with high nonlinearity
IEEE Transactions on Information Theory
Construction of nonlinear resilient Boolean functions using "small" affine functions
IEEE Transactions on Information Theory
Improved construction of nonlinear resilient S-boxes
IEEE Transactions on Information Theory
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
Frontiers of Computer Science in China
Hi-index | 754.84 |
In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function F : GF(2)n → GF(2)m to generate the blocks of m ≥ 1 keystream bits at the time. In difference to a classical guess and determine attack, a method based on guessing certain bits in order to determine the remaining secret key/state bits, our approach efficiently takes advantage of the reduced preimage space for relatively large m and at the same time employing the design structure of the cipher. Several variations of the algorithm are derived to circumvent the sensitivity of attack to the input data, n, m and the key length. In certain cases, our attack outperforms classical algebraic attacks [10]; these being considered as one of the most efficient cryptanalyst tools for this type of ciphers. A superior performance of our attack over algebraic attacks is demonstrated in case the filtering function belongs to the extended Maiorana-McFarland class.