【24h】

Algebraic Attacks on Stream Ciphers with Linear Feedback

机译:用线反馈流攻击流密码的代数攻击

获取原文

摘要

A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attacks, that can be seen as solving a system of multivariate linear equations, true with some probability. At ICISC'02 this approach is extended to systems of higher-degree multivariate equations, and gives an attack in 2{sup}92 for Toyocrypt, a Cryptrec submission. In this attack the key is found by solving an overdefined system of algebraic equations. In this paper we show how to substantially lower the degree of these equations by multiplying them by well-chosen multivariate polynomials. Thus we are able to break Toyocrypt in 2{sup}49 CPU clocks, with only 20 Kbytes of keystream, the fastest attack proposed so far. We also successfully attack the Nessie submission LILI-128, within 2{sup}57 CPU clocks (not the fastest attack known). In general, we show that if the Boolean function uses only a small subset (e.g. 10) of state/LFSR bits, the cipher can be broken, whatever is the Boolean function used (worst case). Our new general algebraic attack breaks stream ciphers satisfying all the previously known design criteria in at most the square root of the complexity of the previously known generic attack.
机译:流密码的经典结构是将多个LFSR和高度非线性布尔函数F组合。它们的安全性通常在相关攻击方面进行分析,可以看出,求解多变量线性方程系统,真实的概率。在ICISC'02,这种方法扩展到更高程度的多变量方程的系统,并为Toyocrypt的2 {Sup} 92进行了攻击,这是一个Cryptrec提交。在此攻击中,通过求解成额的代数方程的过度定义系统来找到密钥。在本文中,我们通过较良好的多变量多项式将它们乘以如何显着降低这些方程的程度。因此,我们能够在2 {sup} 49 CPU时钟中打破丰制金素,只有20千字的keystream,到目前为止提出的最快攻击。我们还成功地攻击了Nessie提交Lili-128,在2 {sup} 57 CPU时钟内(不是最快的攻击)。一般来说,我们表明,如果布尔函数仅使用Sends / LFSR位的小子集(例如,例如10),则密码可以被打破,无论是使用的布尔函数(最坏情况)。我们的新一般代数攻击打破了最满足所有先前已知的设计标准的流密码,以前是先前已知的通用攻击的复杂性的大多数方块。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号