Primitive polynomials for robust scramblers and stream ciphers against reverse engineering

A linear feedback shift register (LFSR) is a basic component of a linear scrambler and a stream cipher for a communication system. And primitive polynomials are used as the feedback polynomials of the LFSRs. In a non-cooperative context, the reverse-engineering of a linear scrambler and a stream cipher includes recovering the feedback polynomials and the LFSR's initial states (which are the secret keys in the case of stream ciphers). The problem of recovering the secret keys of stream ciphers has been extensively studied. For example, an effective approach for recovering a secret key is known as the correlation attack in the literature. The problem of reconstructing the feedback polynomials of a stream cipher and a linear scrambler has been studied recently. Both recovering the LFSR initial states by the above-mentioned correlation attack and reconstructing the feedback polynomials are highly dependent on an assumption, that is, they require that the feedback polynomials have sparse multiples of moderate degrees. Hence, in order to build linear scramblers and stream ciphers that are robust against reverse engineering, we should use primitive polynomials which do not have sparse multiples of moderate degrees. In this paper, we study the existence of primitive polynomials which do not have sparse multiples of moderate degrees, and the density of such primitive polynomials among all primitive polynomials. Our results on the existence and density of such primitive polynomials are better than the previous results in the literature.

[1]  Thomas Johansson,et al.  Fast Correlation Attacks Based on Turbo Code Techniques , 1999, CRYPTO.

[2]  Anne Canteaut,et al.  Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 , 2000, EUROCRYPT.

[3]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[4]  Willi Meier,et al.  Fast Correlation Attacks on Stream Ciphers (Extended Abstract) , 1988, EUROCRYPT.

[5]  R. A. Rueppel Analysis and Design of Stream Ciphers , 2012 .

[6]  Walter T. Penzhorn,et al.  Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers , 1995, IMACC.

[7]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[8]  Mathieu Cluzeau,et al.  Reconstruction of a Linear Scrambler , 2007, IEEE Transactions on Computers.

[9]  Willi Meier,et al.  Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.

[10]  Vladimir V. Chepyzhov,et al.  On A Fast Correlation Attack on Certain Stream Ciphers , 1991, EUROCRYPT.

[11]  Eric Filiol,et al.  Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators , 2000, FSE.

[12]  Subhamoy Maitra,et al.  Multiples of Primitive Polynomials over GF(2) , 2001, INDOCRYPT.

[13]  Ayineedi Venkateswarlu,et al.  Multiples of Primitive Polynomials and Their Products over GF(2) , 2002, Selected Areas in Cryptography.

[14]  Subhamoy Maitra,et al.  Primitive Polynomials over GF(2) - A Cryptologic Approach , 2001, ICICS.

[15]  K Jambunathan On Choice of Connection-Polynominals for LFSR-Based Stream Ciphers , 2000, INDOCRYPT.

[16]  Thomas Johansson,et al.  Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes , 1999, EUROCRYPT.

[17]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[18]  Walter T. Penzhorn,et al.  Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting Codes , 1996, FSE.

[19]  Hideki Imai,et al.  Modeling Block Decoding Approaches for the Fast Correlation Attack , 2007, IEEE Transactions on Information Theory.

[20]  Bin Zhang,et al.  An Improved Fast Correlation Attack on Stream Ciphers , 2009, Selected Areas in Cryptography.

[21]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.