A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes a novel approach for cryptanalysis of keystream generators based on the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis. Oppositely to the previously reported methods, the proposed one also identifies and uses certain characteristics of the LFSM state-transition matrix in order to reduce the nonlinearity of the system of overdefined equations employed in an algebraic attack scenario or to reduce the noise introduced due to the linearization of the nonlinear function which corrupts the linear equations employed in a correlation attack scenario. The developed method is employed for efficient cryptanalysis of the nonlinear combination keystream generator recently reported at INDOCRYPT 2004.
- 社団法人電子情報通信学会の論文
- 2005-05-20
著者
-
IMAI Hideki
Chuo University
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
Fossorier Marc
Department Of Electrical Engineering University Of Hawaii
-
IMAI Hideki
Institute of Industrial Science, The University of Tokyo
-
Mihaljevic Miodrag
Mathematical Institute, Serbian Academy of Science and Arts
-
Imai Hideki
Institute Of Industrial Science The University Of Tokyo
-
Mihaljevic Miodrag
Mathematical Institute Of Serbian Academy Of Sciences And Arts:research Center For Information Secur
-
Imai Hideki
Institute Of Industrial Science Interfaculty Initiative For Information Studies University Of Tokyo
-
Fossorier Marc
Department of Electrical Engineering, University of Hawaii
関連論文
- Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
- Efficient Algorithms for Tate Pairing(Elliptic Curve Cryptography, Cryptography and Information Security)
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- Coded Modulation for Satellite Broadcasting Based on Unconventional Partitionings (Special Section on Information Theory and Its Applications)
- 不均一誤り訂正のための3レベルBCH符号化8-PSK変調について
- Unconditionally Secure Chaffing-and-Winnowing
- A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity
- A Novel Probabilistic Passive Attack on the Protocols HB and HB^+
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)