Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes

This paper describes new methods for fast correlation attacks, based on the theory of convolutional codes. They can be applied to arbitrary LFSR feedback polynomials, in opposite to the previous methods, which mainly focus on feedback polynomials of low weight. The results improve significantly the few previous results for this general case, and are in many cases comparable with corresponding results for low weight feedback polynomials.

[1]  Ed Dawson,et al.  Fast correlation attacks on the multiplexer generator , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[2]  Irving S. Reed,et al.  Fundamentals of Convolutional Codes , 1999 .

[3]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.

[4]  Jacques Stern,et al.  A method for finding codewords of small weight , 1989, Coding Theory and Applications.

[5]  Walter T. Penzhorn,et al.  Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting Codes , 1996, FSE.

[6]  Rolf Johannesson,et al.  Active Distances for Convolutional Codes , 1999, IEEE Trans. Inf. Theory.

[7]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.

[8]  Niklaus Wirth,et al.  Advances in Cryptology — EUROCRYPT ’88 , 2000, Lecture Notes in Computer Science.

[9]  Ed Dawson,et al.  A Comparison of Fast Correlation Attacks , 1996, FSE.

[10]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[11]  Jovan Dj. Golic,et al.  A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence , 1990, AUSCRYPT.

[12]  Vladimir V. Chepyzhov,et al.  On A Fast Correlation Attack on Certain Stream Ciphers , 1991, EUROCRYPT.

[13]  Jeffrey S. Leon,et al.  A probabilistic algorithm for computing minimum weights of large error-correcting codes , 1988, IEEE Trans. Inf. Theory.

[14]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[15]  Rolf Johannesson,et al.  Fundamentals of Convolutional Coding , 1999 .

[16]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .