Correlation Attacks on Stream Cipher
نویسنده
چکیده
Correlation attacks on stream cipher are divide and conquer attacks applied to nonlinear combination generators based on linear feedback shift registers. These are cipher text only attacks that exploit the correlation between the cipher text and the underlying shift register sequences to recover the initial state of the underlying LFSRs. Fast correlation attacks are based on use of parity check equations on which a decoding technique or an iterative errorcorrection algorithm is applied to recover the initial state. The fast correlation attack using the Viterbi decoding algorithm that applied principles from convolution coding theory gives substantial improvement over previous attacks. Keywords-Stream Cipher, LFSR, Generators, Convolutional Codes, Fast Correlation Attack.
منابع مشابه
Fast Correlation Attacks: Methods and Countermeasures
Fast correlation attacks have considerably evolved since their first appearance. They have lead to new design criteria of stream ciphers, and have found applications in other areas of communications and cryptography. In this paper, a review of the development of fast correlation attacks and their implications on the design of stream ciphers over the past two decades is given.
متن کاملCombining Certain Nonlinear Feedback Shift Registers
Stream ciphers that deploy linear feedback shift registers (LFSRs) have been shown to be vulnerable under fast correlation attacks [20], [21], [14], algebraic attacks [7], [28], fast algebraic attacks [6], [1], and fault attacks [13]. We discuss certain nonlinear feedback shift registers (NLFSRs) recommended as substitutes for LFSRs in stream cipher systems.
متن کاملWhen Stream Cipher Analysis Meets Public-Key Cryptography
Inspired by fast correlation attacks on stream ciphers, we present a stream cipher-like construction for a public-key cryptosystem whose security relies on two problems: finding a low-weight multiple of a given polynomial and a Hidden Correlation problem. We obtain a weakly secure public-key cryptosystem we call TCHo (as for Trapdoor Cipher, Hardware Oriented). Using the Fujisaki-Okamoto constr...
متن کاملA fast correlation attack
A fast correlation attack Andreas Klein Gent university Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281-S22 9000 Ghent, Belgium Correlation attacks are an important class of attacks against shift register based stream ciphers. Consider for example the following very simple cipher.
متن کاملTheoretical analysis of a correlation attack based on convolutional codes
One general class of attacks on stream ciphers is correlation attacks. Most of previous results regarding performance of correlation attacks have been based entirely on simulations. In this paper, we use random coding bounds for convolutional codes to give a theoretical analysis of a previously proposed correlation attack based on convolutional codes. The results from the theoretical derivation...
متن کامل