A New Simple Attack on a Wide Class of Cryptographic Sequence Generators

The class of decimation-based sequence generators attempts to obtain an implicit non-linearity from the decimation process. In this work, it is shown that the output sequence of a well known member of this generator class, the shrinking generator, is composed of PN-sequences generated by Linear feedback Shift Registers. Furthermore, these PN-sequences are shifted versions of a unique sequence whose initial positions can be determined using discrete logarithms. Taking advantage of the linearity of the PN-sequences, a method of recovering the whole output sequence from a small number of intercepted bits is proposed. The algorithm is deterministic, always finds the cryptosystem key and is very adequate for parallelization. The basic ideas of this work can be generalized to other elements in the same class of sequence generators.

[1]  A. Fster-Sabater,et al.  Generation of Cryptographic Sequences by means of Difference Equations , 2014 .

[2]  Solomon W. Golomb,et al.  Shift Register Sequences , 1981 .

[3]  Antoine Joux,et al.  A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic , 2014, EUROCRYPT.

[4]  Jovan Dj. Golic,et al.  Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers , 1994, EUROCRYPT.

[5]  Hugo Krawczyk,et al.  The Shrinking Generator , 1994, CRYPTO.

[6]  Willi Meier,et al.  Predicting the Shrinking Generator with Fixed Connections , 2003, EUROCRYPT.

[7]  Klaus Huber Some comments on Zech's logarithms , 1990, IEEE Trans. Inf. Theory.

[8]  Håvard Molland Improved Linear Consistency Attack on Irregular Clocked Keystream Generators , 2004, FSE.

[9]  Bin Zhang,et al.  A Fast Correlation Attack on the Shrinking Generator , 2005, CT-RSA.

[10]  Thomas Johansson Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators , 1998, ASIACRYPT.

[11]  Amparo Fúster-Sabater,et al.  Linear Models for the Self-Shrinking Generator Based on CA , 2016, J. Cell. Autom..

[12]  Jérémie Detrey,et al.  Discrete Logarithm in GF(2809) with FFS , 2014, Public Key Cryptography.

[13]  Rudolf Lide,et al.  Finite fields , 1983 .

[14]  Leonie Ruth Simpson,et al.  A Probabilistic Correlation Attack on the Shrinking Generator , 1998, ACISP.

[15]  Amparo Fúster-Sabater,et al.  Modelling the shrinking generator in terms of linear CA , 2016, Adv. Math. Commun..

[16]  Pino Caballero-Gil,et al.  Linear solutions for cryptographic nonlinear sequence generators , 2010, ArXiv.

[17]  Jovan Dj. Golic Correlation Analysis of the Shrinking Generator , 2001, CRYPTO.

[18]  Hugo Krawczyk,et al.  The Shrinking Generator: Some Practical Considerations , 1993, FSE.