Generalized Inversion Attack on Nonlinear Filter Generators

  • Authors:
  • Jovan Dj. Golic;Andrew Clark;Ed Dawson

  • Affiliations:
  • Univ. of Belgrade, Belgrade, Yugoslavia;Queensland Univ. of Technology, Brisbane, Queensland, Australia;Queensland Univ. of Technology, Brisbane, Queensland, Australia

  • Venue:
  • IEEE Transactions on Computers
  • Year:
  • 2000

Quantified Score

Hi-index 14.98

Visualization

Abstract

A nonlinear filter generator is a basic keystream generator for stream cipher applications consisting of a single linear feedback shift register whose output is filtered by a nonlinear combining function. A binary nonlinear filter generator is viewed as a finite input memory automaton with one binary input and one binary output. The generalized inversion attack on a binary nonlinear filter generator is developed and analyzed by the theory of critical branching processes. Its objective is to recover the unknown input sequence from a given segment of the output sequence, provided that the filter function is known. Unlike the inversion attack, which requires that the filter function be linear in the first or the last input variable, this attack can be applied for any filter function. Both theory and systematic experiments show that its time complexity remains close to $2^M$, which is the time complexity of the inversion attack, where $M$ denotes the input memory size in bits.