GENERALIZED STATISTICAL ATTACK ON SYNCRONOUS STREAM CIPHERS
نویسندگان
چکیده
منابع مشابه
Linear Extension Cube Attack on Stream Ciphers
Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ciphers, which makes improvement on the pre-processing phase of the original attack. The new method can induce maxterms of higher-order from those of lower-order by the trade-off between time and space, thus recovering more key bits and reducing the search complexity on higher-dimension. In this ...
متن کاملDecimation Attack of Stream Ciphers
This paper presents a new attack called Decimation Attack of most stream ciphers. It exploits the property that multiple clocking (or equivalently d-th decimation) of a LFSR can simulate the behavior of many other LFSRs of possible shorter length. It yields then signiicant improvements of all the previous known correlation and fast correlation attacks. A new criterion on the length of the polyn...
متن کاملOn A Fast Correlation Attack on Certain Stream Ciphers
In this paper we present a new algorithm for the recovery of the initial state of a linear feedback shift register when a noisy output sequence is given. Our work is focussed on the investigation of the asymptotical behaviour of the recovery process rather than on the construction of an optimal recovery procedure. Our results show the importance of low-weight checks and show also that the compl...
متن کاملChosen-IV Statistical Attacks on eSTREAM Stream Ciphers
d-Monomial tests are statistical randomness tests based on Algebraic Normal Form representation of a Boolean function, and were first introduced by Filiol in 2002. We show that there are strong indications that the Gate Complexity of a Boolean function is related to a bias detectable in a d-Monomial test. We then discuss how to effectively apply d-Monomial tests in chosen-IV attacks against str...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ukrainian Information Security Research Journal
سال: 2015
ISSN: 2410-7840,2221-5212
DOI: 10.18372/2410-7840.17.9532