Linear models for keystream generators

被引:20
|
作者
Golic, JD [1 ]
机构
[1] UNIV BELGRADE, SCH ELECT ENGN, BELGRADE, YUGOSLAVIA
关键词
clock-controlled shift registers; correlation coefficients; cryptography; keystream generators; linear models;
D O I
10.1109/12.481485
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is shown that an arbitrary binary keystream generator with M bits of memory can be linearly modeled as a nonautonomous linear feedback shift register of length at most M with an additive input sequence of nonbalanced identically distributed binary random variables. The sum of the squares of input correlation coefficients over all the linear models of any given length proves to be dependent on a keystream generator. The minimum and maximum values of the correlation sum along with-the necessary and sufficient conditions for them to be achieved are established. An effective method for the linear model determination based on the linear sequential circuit approximation of autonomous finite-state machines is developed. Linear models for clock-controlled shift registers and arbitrary shift register based keystream generators are derived. Several examples including the basic summation generator, the clock-controlled cascade, and the shrinking generator are presented. Linear models are the basis for a general structure-dependent and initial-state-independent statistical test. They may also be used for divide and conquer correlation attacks on the initial state. Security against the corresponding statistical attack appears hard to control in practice and generally hard to achieve with simple keystream generator schemes.
引用
收藏
页码:41 / 49
页数:9
相关论文
共 50 条
  • [1] A family of keystream generators with large linear complexity
    García-Villalba, LJ
    Rodríguez-Palánquex, MC
    APPLIED MATHEMATICS LETTERS, 2001, 14 (05) : 545 - 547
  • [2] Global linear complexity analysis of filter keystream generators
    FusterSabater, A
    CaballeroGil, P
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 33 - 38
  • [3] Comments on "A family of keystream generators with large linear complexity"
    Fúster-Sabater, A
    APPLIED MATHEMATICS LETTERS, 2004, 17 (06) : 739 - 740
  • [4] Improved linear consistency attack on irregular clocked keystream generators
    Molland, H
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 109 - 126
  • [5] Improved linear consistency attack on irregular clocked keystream generators
    Molland, Håvard
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3017 : 109 - 126
  • [6] On the Existence of Secure Keystream Generators
    Andrew Klapper
    Journal of Cryptology, 2001, 14 : 1 - 15
  • [7] On the existence of secure keystream generators
    Klapper, A
    JOURNAL OF CRYPTOLOGY, 2001, 14 (01) : 1 - 15
  • [8] Intrinsic statistical weakness of keystream generators
    Golic, JD
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 91 - 103
  • [9] A New Construction Method for Keystream Generators
    Gul, Cagdas
    Kara, Orhun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3735 - 3744
  • [10] BDD-based cryptanalysis of keystream generators
    Krause, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 222 - 237