Abstract
We describe an algorithm extending the previously proposed method of key recovery of a filter generator. The algorithm is based on an approximation of the combining function by algebraically degenerate functions. We give estimates of the computational complexity, reliability, and the amount of memory used by the method. Examples of application of the method are considered, in particular, for the analysis of the LILI-128 cipher.
Note: Originally published in Diskretnaya Matematika (2017) 29, №4, 3–27 (in Russian).
Funding
This research was carried out with the financial support of the Russian Foundation for Basic Research (grant no. 16-01-00470 A).
Acknowledgement
The authors are deeply grateful to O. A. Logachev, A. A. Chilikov, S. V. Smyshlyaev, and G. A. Karpunin for their valuable comments, constructive criticism, and help in the preparation of the manuscript. The authors would like to express special thanks to the referees F. M. Malyshev and A. V. Tarasov for a thorough and thoughtful reading of this paper and for several helpful suggestions that allowed us to rectify some errors and inaccuracies and make the presentation more accessible.
References
[1] Alekseev E.K., Kushchinskaya L.A., “On the construction of generalized approximations for one filter generator key recovery method”, 6rd Workshop on Current Trends in Cryptology (CTCrypt 2017), Pre-proceedings, 2017, 247-259.Suche in Google Scholar
[2] Ashur T., Beyne T., Rijmen V., “Revisiting the wrong-key-randomization hypothesis”, Report 2016/990, IACR Cryptology ePrintArchive, 2016.Suche in Google Scholar
[3] Biham E., Shamir A., “Differential cryptanalysis of DES-like cryptosystems”, J. Cryptology, 4:1 (1991), 3–72.10.1007/BF00630563Suche in Google Scholar
[4] Bogdanov A., Tischhauser E., “On the wrong key randomisation and key equivalence hypotheses in Matsui’s algorithm 2”, FSE 2013, Lect. Notes Comput. Sci., 8424 (2013), 19–38.10.1007/978-3-662-43933-3_2Suche in Google Scholar
[5] Collard B., Standaert F.-X., “Experimenting linear cryptanalysis”, Advanced Linear Cryptanalysis of Block and Stream Ciphers, Cryptology and Information Security Series, 7, IOS Press, 2011.Suche in Google Scholar
[6] Dawson E., Clark A., Golic J., Millan W., Penna L., Simpson L., “The LILI-128 keystream generator”, Proc. of First NESSIE Workshop, 2000, http://www.cryponessie.org.Suche in Google Scholar
[7] Junod P., “On the complexity of Matsui’s attack”, Lect. Notes Comput. Sci., 2259, 2001, 199–211.10.1007/3-540-45537-X_16Suche in Google Scholar
[8] Matsui M., “Linear cryptanalysis method for DES cipher”, EUROCRYPT ’93, Lect. Notes Comput. Sci., 765, 1994, 386-397.10.1007/3-540-48285-7_33Suche in Google Scholar
[9] Meier W., Staffelbach O., “Fast correlation attacks on certain stream cipher”, J. Cryptology, 1:3 (1989), 159-176.10.1007/BF02252874Suche in Google Scholar
[10] Siegenthaler T., “Decrypting a class of stream cipher using ciphertext only”, IEEE Trans. Computers, C-34(1) (1985), 81-85.10.1109/TC.1985.1676518Suche in Google Scholar
[11] Alekseev E.K., “About an attack on the filter generator with a complication function close to an algebraically singular”, Sb. statey molodykh uchenykh fakul’teta VMK MGU, 2011, № 8, 114-123 (in Russian).Suche in Google Scholar
[12] Alekseev E.K., “On some measures of nonlinearity of Boolean functions”, Prikladnaya diskretnaya matematika, 2 (2011), 5-16 (in Russian).10.17223/20710410/12/1Suche in Google Scholar
[13] Glukhov M.M., Elizarov V.P., Nechaev A.A., Algebra: Textbook. In 2 volumes, M.: Gelios ARV, 2003 (in Russian), 416 pp.Suche in Google Scholar
[14] Logachev O.A., Sal’nikov A.A., Smyshlyaev S.V., Yashchenko V.V., Boolean functions in coding theory and cryptography, LENAND, Moscow, 2015 (in Russian), 584 pp.Suche in Google Scholar
[15] Sevast’yanov B.A., Course of probability theory and mathematical statistics, M.: Nauka, 1982 (in Russian), 256 pp.Suche in Google Scholar
© 2019 Walter de Gruyter GmbH, Berlin/Boston
Artikel in diesem Heft
- Frontmatter
- Generalization of one method of a filter generator key recovery
- Boolean functions as points on the hypersphere in the Euclidean space
- Artinian bimodule with quasi-Frobenius bimodule of translations
- Asymptotic behavior of functions Ω(k; n) and ω(k; n) related to the number of prime divisors
- On some properties of vector functions of Boolean algebra
- Modules over strongly semiprime rings
Artikel in diesem Heft
- Frontmatter
- Generalization of one method of a filter generator key recovery
- Boolean functions as points on the hypersphere in the Euclidean space
- Artinian bimodule with quasi-Frobenius bimodule of translations
- Asymptotic behavior of functions Ω(k; n) and ω(k; n) related to the number of prime divisors
- On some properties of vector functions of Boolean algebra
- Modules over strongly semiprime rings