Design Principles for Combiners with Memory
نویسندگان
چکیده
Stream ciphers are widely used for online-encryption of arbitrarily long data, for example when transmitting speech-data between a mobile phone and a base station. An important class of stream ciphers are combiners with memory, with the E0 generator from the Bluetooth standard for wireless communication being their most prominent example. In this paper, we develop design principles for increasing the resistance of combiners with memory against the most dangerous types of cryptanalytic attacks, namely correlation attacks and algebraic attacks. In the case of algebraic attacks, we introduce the first method to guarantee lower bounds on the attack complexity. Starting from the design of the E0 generator, we combine our results in order to construct ciphers that are simultaneously strengthened against both kinds of attacks. Our analysis shows that small changes in the design of E0 already suffice to improve its security enormously.
منابع مشابه
On a Resynchronization Weakness in a Class of Combiners with Memory
In some applications for synchronous stream ciphers frequent resynchronization or resynchronization upon request may be necessary. We describe a weakness in a class of combiners with one-bit memory which makes them vulnerable in such applications requesting resynchronization. A correlation attack based on chi-square criterion, which in some aspects complements the attack studied by Daemen et. a...
متن کاملAlgebraic attacks on certain stream ciphers
To encrypt data streams of arbitrary lengths, keystream generators are used in modern cryptography which transform a secret initial value, called the key, into a long sequence of seemingly random bits. Many designs are based on linear feedback shift registers (LFSRs), which can be constructed in such a way that the output stream has optimal statistical and periodical properties and which can be...
متن کاملAlgebraic Attacks on Combiners with Memory
Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k, l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory bits. It is shown that for (k, l)-combiner...
متن کاملHow Neurofeedback could affect Working Memory and Processing Speed among Girl Students with Learning Disabilities
Background: Learning disabilities (LDs) are diagnosed in children impaired in the academic skills of reading, writing, and/or mathematics. Children with LDs usually exhibit a slower resting-state electroencephalogram (EEG), corresponding to a neurodevelopmental lag. The present study aimed to investigate the effectiveness of neurofeedback treatment on working memory and processing speed among g...
متن کاملDesign and Use of Modern Optimal Ratio Combiners
This paper will discuss the design and use of Optimal Ratio Combiners in modern telemetry applications. This will include basic design theory, operational setups, and various types of combiner configurations. The paper will discuss the advantages of predetection vs. post-detection combining. Finally, the paper will discuss modern design techniques.
متن کامل