A New Simple Technique to Attack Filter Generators and Related Ciphers

This paper presents a new simple distinguishing attack that can be applied on stream ciphers constructed from filter generators or similar structures. We demonstrate the effectiveness by describing key recovery attacks on the stream cipher LILI-128. One attack on LILI-128 requires 247 bits of keystream and a computational complexity of roughly 253. This is a significant improvement compared to other known attacks.

[1]  Thomas Johansson,et al.  Fast Correlation Attacks Based on Turbo Code Techniques , 1999, CRYPTO.

[2]  Anne Canteaut,et al.  Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 , 2000, EUROCRYPT.

[3]  Information Security and Privacy , 1996, Lecture Notes in Computer Science.

[4]  Gerhard Goos,et al.  Fast Software Encryption , 2001, Lecture Notes in Computer Science.

[5]  Ed Dawson,et al.  Inversion Attack and Branching , 1999, Aust. Comput. J..

[6]  Dan Boneh,et al.  Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.

[7]  Willi Meier,et al.  Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.

[8]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Tor Helleseth,et al.  An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators , 2004, CRYPTO.

[11]  Håvard Molland Improved Linear Consistency Attack on Irregular Clocked Keystream Generators , 2004, FSE.

[12]  Enes Pasalic On Boolean Functions in Symmetric-Key Ciphers , 2003 .

[13]  Thomas Johansson,et al.  Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes , 1999, EUROCRYPT.

[14]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[15]  William Millan,et al.  The LILI-II Keystream Generator , 2002, ACISP.

[16]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[17]  Jacques Stern,et al.  Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.

[18]  Moti Yung,et al.  Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.

[19]  Ed Dawson,et al.  Generalized Inversion Attack on Nonlinear Filter Generators , 2000, IEEE Trans. Computers.

[20]  J. D. Golic Computation of low-weight parity-check polynomials , 1996 .

[21]  Jovan Dj. Golic On the Security of Nonlinear Filter Generators , 1996, FSE.

[22]  Thomas Johansson,et al.  A fast correlation attack on LILI-128 , 2002, Inf. Process. Lett..

[23]  Vladimir V. Chepyzhov,et al.  A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers , 2000, FSE.

[24]  Thomas M. Cover,et al.  Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing) , 2006 .

[25]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[26]  Matthew Franklin,et al.  Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.

[27]  William Millan,et al.  LILI Keystream Generator , 2000, Selected Areas in Cryptography.

[28]  E. Dawson,et al.  The LILI-128 Keystream Generator , 2000 .

[29]  Thomas Johansson,et al.  Distinguishing Attacks on SOBER-t16 and t32 , 2002, FSE.

[30]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[31]  Markku-Juhani O. Saarinen A Time-Memory Tradeoff Attack Against LILI-128 , 2002, FSE.

[32]  David A. Wagner,et al.  A Generalized Birthday Problem , 2002, CRYPTO.

[33]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.

[34]  Shai Halevi,et al.  Cryptanalysis of Stream Ciphers with Linear Masking , 2002, CRYPTO.

[35]  Bart Preneel,et al.  Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .

[36]  Joseph Jean Boutros,et al.  A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function , 2002, Selected Areas in Cryptography.