2004
DOI: 10.1007/978-3-540-28628-8_24
|View full text |Cite
|
Sign up to set email alerts
|

Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers

Abstract: Abstract.Recently proposed algebraic attacks [2,6] and fast algebraic attacks [1,5] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exponential in the degree of the equations. Fast algebraic attacks were introduced [5] as a way of reducing run-time complexity by reducing the degree of the system of equations. Previous reports on fast algebraic attacks [1,5] have underestimated the complexity of substituting the keystream into the system of equations, which in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
60
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 94 publications
(60 citation statements)
references
References 10 publications
0
60
0
Order By: Relevance
“…Indeed, if one can find g of low degree and h = 0 of reasonable degree such that f * g = h, then a fast algebraic attack is feasible, see [13,1,24] (note however that fast algebraic attacks need more data than standard ones). This has been exploited in [14] to present an attack on SFINKS [4] and we can say that with this attack, which comes in addition to the standard algebraic attack, Courtois has made very difficult the work of the designer.…”
Section: Preliminariesmentioning
confidence: 99%
“…Indeed, if one can find g of low degree and h = 0 of reasonable degree such that f * g = h, then a fast algebraic attack is feasible, see [13,1,24] (note however that fast algebraic attacks need more data than standard ones). This has been exploited in [14] to present an attack on SFINKS [4] and we can say that with this attack, which comes in addition to the standard algebraic attack, Courtois has made very difficult the work of the designer.…”
Section: Preliminariesmentioning
confidence: 99%
“…It is a lightweight and efficient cryptographic primitive for ensure confidentiality of transmitted data between two communicated pairs. It proves its robustness by its ability to resist against attacks [3][4] [7] [14]. It has a wide application area especially in mobile devices and embedded systems.…”
Section: Preliminarymentioning
confidence: 99%
“…The detailed complexities of each step are shown in Table 10. A comparison of our attacks with the similar attack 14 [16] and the best attacks [14,25] (both were algebraic attacks) is shown in Table 11 for Case A and B. Experimental Results with w = 1 We did the small-scale experiment to verify our analysis in Section 5 on the keystream { 4 i=2 (x i t ⊕ z t )} instead of {z t } to save the trouble of searching the multiple Q(x) of Second, we choose some random x 1 , then compute the corresponding average and variance of N (x 1 ) ζ over allx 1 = x 1 individually, it turned out 14 The estimate of data complexity in [16] uses a different heuristic formula than ours.…”
Section: The Key-recovery Attackmentioning
confidence: 99%