Design Principles for Combiners with Memory

نویسندگان

  • Frederik Armknecht
  • Matthias Krause
  • Dirk Stegemann
چکیده

Stream ciphers are widely used for online-encryption of arbitrarily long data, for example when transmitting speech-data between a mobile phone and a base station. An important class of stream ciphers are combiners with memory, with the E0 generator from the Bluetooth standard for wireless communication being their most prominent example. In this paper, we develop design principles for increasing the resistance of combiners with memory against the most dangerous types of cryptanalytic attacks, namely correlation attacks and algebraic attacks. In the case of algebraic attacks, we introduce the first method to guarantee lower bounds on the attack complexity. Starting from the design of the E0 generator, we combine our results in order to construct ciphers that are simultaneously strengthened against both kinds of attacks. Our analysis shows that small changes in the design of E0 already suffice to improve its security enormously.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On a Resynchronization Weakness in a Class of Combiners with Memory

In some applications for synchronous stream ciphers frequent resynchronization or resynchronization upon request may be necessary. We describe a weakness in a class of combiners with one-bit memory which makes them vulnerable in such applications requesting resynchronization. A correlation attack based on chi-square criterion, which in some aspects complements the attack studied by Daemen et. a...

متن کامل

Algebraic attacks on certain stream ciphers

To encrypt data streams of arbitrary lengths, keystream generators are used in modern cryptography which transform a secret initial value, called the key, into a long sequence of seemingly random bits. Many designs are based on linear feedback shift registers (LFSRs), which can be constructed in such a way that the output stream has optimal statistical and periodical properties and which can be...

متن کامل

Algebraic Attacks on Combiners with Memory

Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k, l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory bits. It is shown that for (k, l)-combiner...

متن کامل

How Neurofeedback could affect Working Memory and Processing Speed among Girl Students with Learning Disabilities

Background: Learning disabilities (LDs) are diagnosed in children impaired in the academic skills of reading, writing, and/or mathematics. Children with LDs usually exhibit a slower resting-state electroencephalogram (EEG), corresponding to a neurodevelopmental lag. The present study aimed to investigate the effectiveness of neurofeedback treatment on working memory and processing speed among g...

متن کامل

Design and Use of Modern Optimal Ratio Combiners

This paper will discuss the design and use of Optimal Ratio Combiners in modern telemetry applications. This will include basic design theory, operational setups, and various types of combiner configurations. The paper will discuss the advantages of predetection vs. post-detection combining. Finally, the paper will discuss modern design techniques.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005