A new analysis method for nonlinear component of stream ciphers

被引:0
作者
机构
[1] State Key Laboratory of Integrated Service Networks, Xidian University
[2] School of Information Science and Technology, Shijiazhuang Tiedao University
[3] School of Science, Xi'an University of Architecture and Technology
来源
Zhao, Y. (zhaoyb1101@yahoo.com.cn) | 1600年 / Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong卷 / 10期
关键词
Boolean function; Cryptography; Stream cipher; Walsh spectrum;
D O I
10.12733/jics20102320
中图分类号
学科分类号
摘要
A popular construction of stream ciphers is to combine several LFSRs and nonlinear components, such as a Nonlinear Feedback Shift Register (NFSR) and a Boolean function. In this paper, we present a new analysis method for stream ciphers based on the Walsh spectrum. Besides the security properties, balancedness, nonlinearity and correlation immunity of nonlinear component, our works are focused on the key points of the values of Walsh spectrum, which influence these security indicators. By this method, the weakness of nonlinear component can be found more easily and clearly. Finally, we use this method to analyze the Grain v1 and point out its' security weakness. © 2013 Binary Information Press.
引用
收藏
页码:5313 / 5321
页数:8
相关论文
共 12 条
[1]  
Meier W., Fast correlation attacks: Methods and countermeasures, Fast Software Encryption 2011, 6733, pp. 55-67, (2011)
[2]  
Courtois N., Meierm W., Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology-EUROCRYPT 2003, pp. 346-359, (2003)
[3]  
Siegenthaler T., Correlation-immunity of the combining functions for cryptographic applications, IEEE Transactions on Information Theory, 30, 5, pp. 776-780, (1984)
[4]  
Knellwolf S., Meier W., Naya-Plasencia M., Conditional differential cryptanalysis of trivium and KATAN, 7118, pp. 200-212, (2012)
[5]  
eSTREAM: ECRYPT stream cipher project, (2004)
[6]  
Crama Y., Hammer P.L., Boolean Functions: Theory, Algorithms, and Applications, (2011)
[7]  
Canteaut A., Augot D., Cid C., Et al., Ongoing research areas in symmetric cryptography, (2008)
[8]  
Gammel B.M., Gottfert R., Kniffler O., The Achterbahn stream cipher, (2005)
[9]  
Johansson T., Meier W., Muller F., Cryptanalysis of achterbahn, Fast Software Encryption 2006, 4047, pp. 1-14, (2006)
[10]  
Hell M., Johansson T., Meier W., Grain-a stream cipher for constrained environments, (2005)