An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG
نویسندگان
چکیده
In this paper, we propose an algebraic attack on stream ciphers. Starting from a well-known due to Courtois and Meier, design especially effective against nonlinear filter generators. First, test it two toy ciphers then show that the level of security WG-PRNG, one submitted NIST competition Lightweight Cryptography, is less than claimed until now.
منابع مشابه
An Efficient Prng for Stream Ciphers Based on Hybrid Cellular Automata with Nonlinear Feedback
This work proposes a high efficiency PRNG suitable for use in stream ciphers. It is based on hybrid cellular automata with nonlinear feedback to improve its resistance to attacks. It is shown that it can be designed with an arbitrary number N of cells as long as N>Nth with no need for designing a new polynomial like in traditional feedback shift registers (it is easily scalable). The space of t...
متن کاملAn Improved Attack on WG Stream Cipher
WG is a synchronous stream cipher submitted to the hardware profile of eSTREAM project. The main feature of this stream cipher is the use of WG transformation. WG uses keys and initial vectors (IVs) of the same lengths 80, 96, 112 and 128 bits. Moreover, IVs of the length 32 and 64 bits are admitted. The most important key recovery attack on WG was presented by Wu and Preneel and uses the weakn...
متن کاملGeneralized Inversion Attack on Nonlinear Filter Generators
ÐA nonlinear filter generator is a basic keystream generator for stream cipher applications consisting of a single linear feedback shift register whose output is filtered by a nonlinear combining function. A binary nonlinear filter generator is viewed as a finite input memory automaton with one binary input and one binary output. The generalized inversion attack on a binary nonlinear filter gen...
متن کاملLinear Extension Cube Attack on Stream Ciphers
Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ciphers, which makes improvement on the pre-processing phase of the original attack. The new method can induce maxterms of higher-order from those of lower-order by the trade-off between time and space, thus recovering more key bits and reducing the search complexity on higher-dimension. In this ...
متن کاملDecimation Attack of Stream Ciphers
This paper presents a new attack called Decimation Attack of most stream ciphers. It exploits the property that multiple clocking (or equivalently d-th decimation) of a LFSR can simulate the behavior of many other LFSRs of possible shorter length. It yields then signiicant improvements of all the previous known correlation and fast correlation attacks. A new criterion on the length of the polyn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Mathematics of Communications
سال: 2023
ISSN: ['1930-5346', '1930-5338']
DOI: https://doi.org/10.3934/amc.2023016