Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
نویسندگان
چکیده
NLS is a stream cipher which was submitted to eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called as Crossword Puzzle attack. NLSv2 is the tweak version of NLS which aims mainly at avoiding the CP attack. In this paper, a new distinguishing attack against NLSv2 is presented. The attack exploits high correlation amongst neighboring bits of the cipher. The paper first shows that the modular addition preserves pairwise correlations as demonstrated by existence of linear approximations with large biases. Next it shows how to combine these results with the existence of high correlation between bits 29 and 30 of the S-box to obtain a distinguisher whose bias is around 2. Consequently, we claim that NLSv2 is distinguishable from a random stream cipher after observing around 2 keystream words.
منابع مشابه
The usefulness of crossword puzzle as a self-learning tool in pharmacology
Introduction: Pharmacology is perceived as a volatile subject asit’s difficult to recall and recite the core of the subject. Enrichingthe learning environment through incorporation of a variety ofteaching and learning strategies and methods yields enhancedlearning. Crossword puzzles provide expansion of vocabulary,stimulate thinking capacity, boost confidence, and fasten up thelearning capacity...
متن کاملCrossword Puzzle Attack on NLS
NLS is one of the stream ciphers submitted to the eSTREAM project. We present a distinguishing attack on NLS by Crossword Puzzle (CP) attack method which is newly introduced in this paper. We build the distinguisher by using linear approximations of both the non-linear feedback shift register (NFSR) and the nonlinear filter function (NLF). Since the bias of the distinguisher depends on the Kons...
متن کاملOn Exploiting Adjacent Bits in NLS
NLS is a stream cipher consisting of a non-linear feedback shift register (NFSR) and a non-linear filter (NLF). This paper presents a linear distinguishing attack on NLS using an improved version of the Crossword Puzzle (CP) attack [2] by exploiting the internal dependencies between the NFSR and NLF. We derive significantly higher bias linear approximations of the NFSR and NLF using linear comb...
متن کاملApplying Decomposition Methods to Crossword Puzzle Problems
In this paper, we investigate the performance of several existing structural decomposition methods on fully interlocked Crossword Puzzle Problems (CPPs) and draw directions for future research.
متن کاملOn Computer Integrated Rationalized Crossword Puzzle Manufacturing
The crossword puzzle is a classic pastime that is well-known all over the world. We consider the crossword manufacturing process in more detail, investigating a two-step approach, first generating a mask, which is an empty crossword puzzle skeleton, and then filling the mask with words from a given dictionary to obtain a valid crossword. We show that the whole manufacturing process is NP-comple...
متن کامل