2011
DOI: 10.1007/s11432-011-4295-7
|View full text |Cite
|
Sign up to set email alerts
|

Improved multi-pass fast correlation attacks with applications

Abstract: In this paper we propose two new algorithms for multi-pass fast correlation attacks on stream ciphers. The first algorithm aims at fast symbol-wise decoding in the circumstances that the noise is not very high and we have little resource for pre-computation. The second algorithm deals with the practical decoding problem in the high noise and limited keystream cases. The new algorithms are applicable to arbitrary form LFSR and compare favorably to the previously known algorithms in the scenarios under considera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
4
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Traditional methods for generating PRNS are mainly based on the linear congruential method or linear feedback shift registers. However, the innerlinear construction of these methods will make a greater risk by correlation attack [4] and algebraic attack [5]. Therefore, an improved method for generating PRNS is to use nonlinear source.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional methods for generating PRNS are mainly based on the linear congruential method or linear feedback shift registers. However, the innerlinear construction of these methods will make a greater risk by correlation attack [4] and algebraic attack [5]. Therefore, an improved method for generating PRNS is to use nonlinear source.…”
Section: Introductionmentioning
confidence: 99%
“…LFSRs are extensively used as basic functional blocks in key stream generators in stream cipher models due to their large period, good statistical properties and fast implementation in hardware as well as in software. However, one important drawback of LFSR is that the sequences outputted by LFSR are completely linear, and thus cryptographically insecure [9][10][11]. Due to the limitations of LFSR, the application of nonlinear feedback shift register (NLFSR) becomes more popular.…”
Section: Introductionmentioning
confidence: 99%
“…Next, we demonstrate our cycles joining algorithm through an illustrative example. 2) List all the cycles of the state transition graph of L by the sorting rule, δ 1 16 → δ 2 16 → δ 4 16 → δ 7 16 → δ 13 16 → δ 9 16 → δ 1 16 , δ 3 16 → δ 5 16 → δ 10 16 → δ 3 16 , δ 6 16 → δ 12 16 → δ 8 16 → δ 16 16 → δ 15 16 → δ 14 16 → δ 11 16 → δ 6 2 n . 3) In the second cycle, replace δ 10 16 with δ 2 16 as the new predecessor of δ 3 16 and δ 4 16 with δ 3 16 as the new successor of δ 10 16 .…”
mentioning
confidence: 99%
See 1 more Smart Citation