首页> 外文会议>Fast Software Encryption >Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator
【24h】

Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator

机译:对自收缩发生器的猜测和确定代数攻击

获取原文
获取原文并翻译 | 示例

摘要

The self-shrinking Generator (SSG) was proposed by Meier and Staffelbach at Eurocrypt'94. Two similar guess-and-determine attacks were independently proposed by Hell-Johansson and Zhang-Feng in 2006, and give the best time/data tradeoff on this cipher so far. These attacks do not depend on the Hamming weight of the feedback polynomial (defining the LFSR in SSG). In this paper we propose a new attack strategy against SSG, when the Hamming weight is at most 5. For this case we obtain a better tradeoff than all previously known attacks (including Hell-Johansson and Zhang-Feng). Our main idea consists in guessing some information about the internal bitstream of the SSG, and expressing this information by a system of polynomial equations in the still unknown key bits. From a practical point of view, we show that using a SAT solver, such as MiniSAT, is the best way of solving this polynomial system. Since Meier and Staffelbach original paper, avoiding low Hamming weight feedback polynomials has been a widely believed principle. However this rule did not materialize in previous recent attacks. With the new attacks described in this paper, we show explicitly that this principle remains true.
机译:自收缩发生器(SSG)由Meier和Staffelbach在Eurocrypt'94上提出。 Hell-Johansson和Zhang-Feng在2006年分别提出了两次类似的猜测和确定攻击,并在迄今为止的密码上获得了最佳的时间/数据权衡。这些攻击不依赖于反馈多项式的汉明权重(在SSG中定义LFSR)。在本文中,当汉明权重最大为5时,我们提出了一种针对SSG的新攻击策略。在这种情况下,与所有已知攻击(包括Hell-Johansson和Zhang-Feng)相比,我们可以获得更好的权衡。我们的主要思想是猜测有关SSG内部比特流的一些信息,并通过仍未知的关键比特中的多项式方程组来表达此信息。从实践的角度来看,我们表明使用SAT求解器(例如MiniSAT)是求解此多项式系统的最佳方法。自从Meier和Staffelbach撰写论文以来,避免使用低汉明重量反馈多项式已成为人们普遍认为的原理。但是,该规则在最近的近期攻击中并未实现。通过本文描述的新攻击,我们明确表明了这一原理。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号