Attacking the combination generator

نویسندگان

  • Frédéric Didier
  • Yann Laigle-Chapuy
چکیده

We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to be resistant to other kinds of attacks. We use only classical tools, namely vectorial correlation, weight 4 multiples and Walsh transform.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Solving a Class of Modular Polynomial Equations and its Relation to Modular Inversion Hidden Number Problem and Inversive Congruential Generator

In this paper we revisit the modular inversion hidden number problem (MIHNP) and the inversive congruential generator (ICG) and consider how to attack them more efficiently. We consider systems of modular polynomial equations of the form aij + bijxi + cijxj + xixj = 0 (mod p) and show the relation between solving such equations and attacking MIHNP and ICG. We present three heuristic strategies ...

متن کامل

Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator

In this paper we revisit the modular inversion hidden number problem and the inversive congruential pseudo random number generator and consider how to more efficiently attack them in terms of fewer samples or outputs. We reduce the attacking problem to finding small solutions of systems of modular polynomial equations of the form ai+bix0+cixi+x0xi = 0 (mod p), and present two strategies to cons...

متن کامل

Improved Linear Consistency Attack on Irregular Clocked Keystream Generators

In this paper we propose a new attack on a general model for irregular clocked keystream generators. The model consists of two feedback shift registers of lengths l1 and l2, where the first shift register produces a clock control sequence for the second. This model can be used to describe among others the shrinking generator, the step-1/step2 generator and the stop and go generator. We prove th...

متن کامل

Neuro-fuzzy Sliding Mode Controller Based on a Brushless Doubly Fed Induction Generator

The combination of neural networks and fuzzy controllers is considered as the most efficient approach for different functions approximation, and indicates their ability to control nonlinear dynamical systems. This paper presents a hybrid control strategy called Neuro-Fuzzy Sliding Mode Control (NFSMC) based on the Brushless Doubly fed Induction Generator (BDFIG). This replaces the sliding surfa...

متن کامل

Methods of Attacking and Defending Cryptosystems

94.7 Steganography...................................................................... 1260 94.8 Key Distribution .................................................................. 1260 94.9 Key Management ................................................................. 1260 94.10 Public versus Proprietary Algorithms and Systems.......... 1260 94.11 Classic Attacks..............................

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0907.0971  شماره 

صفحات  -

تاریخ انتشار 2009