An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG

نویسندگان

چکیده

In this paper, we propose an algebraic attack on stream ciphers. Starting from a well-known due to Courtois and Meier, design especially effective against nonlinear filter generators. First, test it two toy ciphers then show that the level of security WG-PRNG, one submitted NIST competition Lightweight Cryptography, is less than claimed until now.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Prng for Stream Ciphers Based on Hybrid Cellular Automata with Nonlinear Feedback

This work proposes a high efficiency PRNG suitable for use in stream ciphers. It is based on hybrid cellular automata with nonlinear feedback to improve its resistance to attacks. It is shown that it can be designed with an arbitrary number N of cells as long as N>Nth with no need for designing a new polynomial like in traditional feedback shift registers (it is easily scalable). The space of t...

متن کامل

An Improved Attack on WG Stream Cipher

WG is a synchronous stream cipher submitted to the hardware profile of eSTREAM project. The main feature of this stream cipher is the use of WG transformation. WG uses keys and initial vectors (IVs) of the same lengths 80, 96, 112 and 128 bits. Moreover, IVs of the length 32 and 64 bits are admitted. The most important key recovery attack on WG was presented by Wu and Preneel and uses the weakn...

متن کامل

Generalized Inversion Attack on Nonlinear Filter Generators

ÐA nonlinear filter generator is a basic keystream generator for stream cipher applications consisting of a single linear feedback shift register whose output is filtered by a nonlinear combining function. A binary nonlinear filter generator is viewed as a finite input memory automaton with one binary input and one binary output. The generalized inversion attack on a binary nonlinear filter gen...

متن کامل

Linear Extension Cube Attack on Stream Ciphers

Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ciphers, which makes improvement on the pre-processing phase of the original attack. The new method can induce maxterms of higher-order from those of lower-order by the trade-off between time and space, thus recovering more key bits and reducing the search complexity on higher-dimension. In this ...

متن کامل

Decimation Attack of Stream Ciphers

This paper presents a new attack called Decimation Attack of most stream ciphers. It exploits the property that multiple clocking (or equivalently d-th decimation) of a LFSR can simulate the behavior of many other LFSRs of possible shorter length. It yields then signiicant improvements of all the previous known correlation and fast correlation attacks. A new criterion on the length of the polyn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Mathematics of Communications

سال: 2023

ISSN: ['1930-5346', '1930-5338']

DOI: https://doi.org/10.3934/amc.2023016