Fast computation of linear approximation of general word-oriented composite function

被引:0
作者
Ma, Sudong [1 ]
Jin, Chenhui [1 ]
Guan, Jie [1 ]
Guan, Ziyu [1 ]
Liu, Shuai [2 ]
机构
[1] Informat Engn Univ, Dept Appl Math, Zhengzhou 450000, Peoples R China
[2] Intelligent Game & Decis Lab, Beijing 100080, Peoples R China
基金
中国国家自然科学基金;
关键词
Stream cipher; MASHA; Fast correlation attack; Linear attack; Pseudo-linear S-box function modulo 2n; STREAM CIPHER; ATTACKS;
D O I
10.1016/j.dam.2024.12.022
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The nonlinear component of word-oriented stream ciphers usually contains a Finite State Machine (FSM). The establishment of linear approximations of word-oriented FSM with high correlations is the basis of linear attack on stream cipher, including linear distinguishing attack and fast correlation attack. However, the existing methods can only give efficient algorithms for several specific word-oriented composite functions. In order to solve this problem, we first define a wider class of composite functions, namely Pseudo-Linear S-box Function Modulo 2n(PLSFM). New PLSFM extends the definition of Pseudo-Linear Function Modulo 2n(PLFM) by introducing S-box functions into PLFM, and covers more composite functions. Secondly, an efficient algorithm for fast calculating the correlation of a given linear approximation of PLSFM is proposed, which allows us to fast search for linear approximations with high correlations. Thirdly, we study the properties of linear approximations of a class of composite functions containing S-box functions, addition modulo 2nand subtraction modulo 2n. Finally, we give the linear approximations of MASHA stream cipher with absolute correlations of 2-23.38 for the first time. If the controlled nonlinear feedback shift register of MASHA degenerates into a linear feedback function, a fast correlation attack with time/data/memory complexity of O(2197.26)/O(2194.96)/O(2196.96) can be given. For SNOW 2.0 stream cipher, we find two other linear approximations with the current best correlation of 2-14.41, then we can give an improved fast correlation attack with time/data/memory complexity of O(2162.91)/O(2161.47)/O(2162.47), respectively. The data complexity of the current best fast correlation attack can be reduced by half if using multiple linear approximations. (c) 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.
引用
收藏
页码:157 / 172
页数:16
相关论文
共 33 条
[1]  
[Anonymous], 2011, ISO/IEC 18033-4
[2]  
Berbain C, 2008, LECT NOTES COMPUT SC, V4986, P98
[3]  
Biryukov A, 2010, LECT NOTES COMPUT SC, V6123, P139, DOI 10.1007/978-3-642-13708-2_9
[4]  
Bogdanov A., 2011, Security evaluation of the K2 stream cipher
[5]  
Chepyzhov V. V., 2000, Lecture Notes in Computer Science, V1978, P181
[6]  
Chose P, 2002, LECT NOTES COMPUT SC, V2332, P209
[7]  
CRYPTREC, 2017, Specifications of e-government recommended ciphers
[8]  
Daemen J., 2002, INFORM SECURITY CRYP, DOI DOI 10.1007/978-3-662-04722-4
[9]  
[ZUC算法研制组 Design Teamdesign Team], 2018, [密码学报, Journal of Cryptologic Research], V5, P167
[10]   Improved Guess and Determine attack on the MASHA stream cipher [J].
Ding, Lin ;
Gu, Dawu ;
Wang, Lei ;
Jin, Chenhui ;
Guan, Jie .
SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (09)