Inferring sequences produced by nonlinear pseudorandom number generators using coppersmith's methods

  • Authors:
  • Aurélie Bauer;Damien Vergnaud;Jean-Christophe Zapalowicz

  • Affiliations:
  • Agence Nationale de la Sécurité des Systèmes d'Information, Paris 07, SP, France;École Normale Supérieure --- C.N.R.S. --- I.N.R.I.A., Paris Cedex 05, France;INRIA Rennes --- Bretagne Atlantique, Rennes, France

  • Venue:
  • PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Number-theoretic pseudorandom generators work by iterating an algebraic map F (public or private) over a residue ring ℤN on a secret random initial seed value v 0 ∈ℤN to compute values $v_{n+1} = F(v_n) \bmod{N}$ for n ∈ℕ. They output some consecutive bits of the state value v n at each iteration and their efficiency and security are thus strongly related to the number of output bits. In 2005, Blackburn, Gomez-Perez, Gutierrez and Shparlinski proposed a deep analysis on the security of such generators. In this paper, we revisit the security of number-theoretic generators by proposing better attacks based on Coppersmith's techniques for finding small roots on polynomial equations. Using intricate constructions, we are able to significantly improve the security bounds obtained by Blackburn et al. .