首页> 外文会议>International Conference on Signal Processing and Communications >Algebraic Attack on the More Generalized Clock-Controlled Alternating Step Generator
【24h】

Algebraic Attack on the More Generalized Clock-Controlled Alternating Step Generator

机译:对更广泛的时钟控制的交替步进发生器的代数攻击

获取原文

摘要

The More Generalized Clock-Controlled Alternating Step Generator, MGCCASG, is a clock-controlled sequence generator proposed by Kanso in 2004. This generator consists of three feedback shift registers with lengths 1, m and n bits. The first register is clocked regularly and controls the clocking of the two others. At each time unit t, the two other shift registers are clocked r(t) times (or not clocked) (resp. s(t) times or not clocked) depending on the clock-control bits in the first register. The values of r(t) and s(t) are determined according to the values of W_B and W_C bits of the first register respectively. The special case when (r(t) = r; r > 1) and (s(t) = s; s > 1) is the Alternating Step(r, s) Generator proposed by Kanso, and the special case when r(t) = s(t) = 1 is the original and well known Alternating Step Generator. Kanso claims there is no efficient attack against the MGCCASG since the positions and the values of the W_B and W_C bits are kept secret and therefore, r(t) and s(t) are unknown. In this paper, we present an algebraic attack on this structure using 4M bits of the output sequence to find the secret key with a computational complexity of O(lM~2 2~(M+l+6) (W_B+ W_C)) and where M = max(m, n). In the case when m = n = l = 64 and W_B = W_C = 8, our attack can find the secret key using 256 output bits and a complexity of O(2~(156)) steps, while the author claims that the best attack needs O(2~(665.8)) steps and the exhaustive search needs O(2~(774.8)) steps.
机译:更广泛的时钟控制的交替步进发生器MGCCASG是2004年由Kanso提出的时钟控制序列发生器。该发生器由三个反馈移位寄存器组成,具有长度1,M和N位。第一个寄存器定期时钟,并控制两个其他寄存器。在每个时间单元t,两个其他移位寄存器是时钟的r(t)次(或未计时)(resp.s(t)次或未计时),具体取决于第一寄存器中的时钟控制位。 R(t)和s(t)的值分别根据第一寄存器的w_b和w_c位的值确定。当(r(t)= r; r> 1)和(s(t)= s; s> 1)是由kanso提出的交替的步骤(R,S)发生器,以及r( t)= s(t)= 1是原始和众所周知的交替步进发生器。 Kanso声称,由于W_B和W_C位的位置和值保持秘密,因此,r(t)和s(t)未知,因此kanso对MGCCASG进行了有效的攻击。在本文中,我们使用输出序列的4M位对该结构提出了代数攻击,以找到具有O(LM〜2 2〜(M + L + 6)(W_B + W_C))的计算复杂度的秘密密钥m = max(m,n)。在m = n = l = 64和w_b = w_c = 8的情况下,我们的攻击可以使用256输出位和O(2〜(156))步骤的复杂性找到密钥,而作者声称最好的攻击需要O(2〜(665.8))步骤和详尽的搜索需求O(2〜(774.8))步骤。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号