Attacking the combination generator
نویسندگان
چکیده
We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to be resistant to other kinds of attacks. We use only classical tools, namely vectorial correlation, weight 4 multiples and Walsh transform.
منابع مشابه
Solving a Class of Modular Polynomial Equations and its Relation to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
In this paper we revisit the modular inversion hidden number problem (MIHNP) and the inversive congruential generator (ICG) and consider how to attack them more efficiently. We consider systems of modular polynomial equations of the form aij + bijxi + cijxj + xixj = 0 (mod p) and show the relation between solving such equations and attacking MIHNP and ICG. We present three heuristic strategies ...
متن کاملFinding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
In this paper we revisit the modular inversion hidden number problem and the inversive congruential pseudo random number generator and consider how to more efficiently attack them in terms of fewer samples or outputs. We reduce the attacking problem to finding small solutions of systems of modular polynomial equations of the form ai+bix0+cixi+x0xi = 0 (mod p), and present two strategies to cons...
متن کاملImproved Linear Consistency Attack on Irregular Clocked Keystream Generators
In this paper we propose a new attack on a general model for irregular clocked keystream generators. The model consists of two feedback shift registers of lengths l1 and l2, where the first shift register produces a clock control sequence for the second. This model can be used to describe among others the shrinking generator, the step-1/step2 generator and the stop and go generator. We prove th...
متن کاملNeuro-fuzzy Sliding Mode Controller Based on a Brushless Doubly Fed Induction Generator
The combination of neural networks and fuzzy controllers is considered as the most efficient approach for different functions approximation, and indicates their ability to control nonlinear dynamical systems. This paper presents a hybrid control strategy called Neuro-Fuzzy Sliding Mode Control (NFSMC) based on the Brushless Doubly fed Induction Generator (BDFIG). This replaces the sliding surfa...
متن کاملMethods of Attacking and Defending Cryptosystems
94.7 Steganography...................................................................... 1260 94.8 Key Distribution .................................................................. 1260 94.9 Key Management ................................................................. 1260 94.10 Public versus Proprietary Algorithms and Systems.......... 1260 94.11 Classic Attacks..............................
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/0907.0971 شماره
صفحات -
تاریخ انتشار 2009