Attacking the Filter Generator over
نویسندگان
چکیده
We consider the filter generator over GF (2) consisting of a linear feedback shift register of length k that generates a maximal length linear sequence of period 2 − 1 over GF (2) and a Boolean function of degree d that combines bits from one element in the shift register (considered as an element in GF (2)) and creates a binary output bit zt at any time t. We show how to extend a recent attack by the authors on the binary filter generator to the filter generator over GF (2). The attack recovers the initial state of the filter generator from L keystream bits with complexity O(L), after a pre-computation with complexity O(L(log2L) ), where L is the linear complexity upper bounded by D = P d i=1 ` n i ́ with n = mk, which is also the number of monomials of degree ≤ d in GF (2). In addition we explain why a function of only one element in the shift register reduces the linear complexity of the keystream, compared to using the function freely on bits from several words in the initial state. We also discusses some implications for the WG cipher.
منابع مشابه
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function
The filter generator is an important building block in many stream ciphers. We present here an attack that recovers the initial state of the hidden LFSR by detecting the positions where the inputs of the filtering function are equal to zero. This attack requires the precomputation of low weight multiples of the LFSR generating polynomial. By a careful analysis, we show that the attack complexit...
متن کاملOptimised BNCT facility based on a compact D-D neutron generator
Background: Boron Neutron Capture Therapy (BNCT) is a very promising treatment for patients suffering gliobastoma multiforme, an aggressive type of brain cancer, where conventional radiation therapies fail. Thermal neutrons are suitable for the direct treatment of cancers which are located at near-tissue-surface deep-seated tumors need harder, epithermal neutron energy spectra. Materials and Me...
متن کاملMachine Learning in the Presence of an Adversary: Attacking and Defending the SpamBayes Spam Filter
Machine Learning in the Presence of an Adversary: Attacking and Defending the SpamBayes Spam Filter
متن کاملMitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection
Jamming has long been a problem in wireless communication systems. Traditionally, defense techniques have looked to raise the cost of mounting an equally effective jamming attack. One technique to raise the cost of jamming is direct sequence spread spectrum (DSSS) which spreads data over a wider bandwidth and has built-in error correction. To work around this, attackers have developed intellige...
متن کاملSolving a Class of Modular Polynomial Equations and its Relation to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
In this paper we revisit the modular inversion hidden number problem (MIHNP) and the inversive congruential generator (ICG) and consider how to attack them more efficiently. We consider systems of modular polynomial equations of the form aij + bijxi + cijxj + xixj = 0 (mod p) and show the relation between solving such equations and attacking MIHNP and ICG. We present three heuristic strategies ...
متن کامل