Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG

A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized. Consequently, under some mild assumptions, which are common in cryptanalysis, the tight lower bounds on the algorithmic complexity of successful Query-Based Key-Recovery attacks are derived for two different setups of practical interest. The proofs rely on the concept of ``typicality'' of information theory.

[1]  Hugo Krawczyk,et al.  The Shrinking Generator , 1994, CRYPTO.

[2]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[3]  Emin Anarim,et al.  A Note on the Periodicity and the Output Rate of Bit Search Type Generators , 2007, IEEE Transactions on Information Theory.

[4]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[5]  Miodrag J. Mihaljevic A faster cryptanalysis of the self-shrinking generator , 1996, ACISP.

[6]  Aline Gouget,et al.  How to Strengthen Pseudo-random Generators by Using Compression , 2006, EUROCRYPT.

[7]  Alex Biryukov,et al.  Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.

[8]  Willi Meier,et al.  The Self-Shrinking Generator , 1994, EUROCRYPT.

[9]  Martin E. Hellman,et al.  A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.

[10]  Chris J. Mitchell,et al.  Analysis of the Bit-Search Generator and Sequence Compression Techniques , 2005, FSE.

[11]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[12]  Willi Meier,et al.  Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.

[13]  Martin Hell,et al.  Two New Attacks on the Self-Shrinking Generator , 2006, IEEE Transactions on Information Theory.

[14]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[15]  Stefan Lucks,et al.  Improved Cryptanalysis of the Self-Shrinking Generator , 2001, ACISP.

[16]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[17]  Oded Goldreich Foundations of Cryptography: Volume 1 , 2006 .

[18]  Solomon W. Golomb,et al.  Shift Register Sequences , 1981 .

[19]  Aline Gouget,et al.  The Bit-Search Generator , 2004 .