An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators

In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that the attack is much more efficient than expected from previous analytic methods, and we believe it improves all previous attacks on the cipher model.

[1]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[2]  Markku-Juhani O. Saarinen A Time-Memory Tradeoff Attack Against LILI-128 , 2002, FSE.

[3]  Thomas Johansson,et al.  Theoretical analysis of a correlation attack based on convolutional codes , 2002, IEEE Trans. Inf. Theory.

[4]  David A. Wagner,et al.  A Generalized Birthday Problem , 2002, CRYPTO.

[5]  Joseph Jean Boutros,et al.  A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function , 2002, Selected Areas in Cryptography.

[6]  Vladimir V. Chepyzhov,et al.  A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers , 2000, FSE.

[7]  Håvard Molland Improved Linear Consistency Attack on Irregular Clocked Keystream Generators , 2004, FSE.

[8]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[9]  J. D. Golic Computation of low-weight parity-check polynomials , 1996 .

[10]  Yuliang Zheng,et al.  The Nonhomomorphicity of Boolean Functions , 1998, Selected Areas in Cryptography.

[11]  Antoine Joux,et al.  Fast Correlation Attacks: An Algorithmic Point of View , 2002, EUROCRYPT.

[12]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[13]  Thomas Johansson,et al.  A fast correlation attack on LILI-128 , 2002, Inf. Process. Lett..

[14]  Walter T. Penzhorn,et al.  Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers , 1995, IMACC.

[15]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[16]  Tor Helleseth,et al.  Improved Fast Correlation Attack Using Low Rate Codes , 2003, IMACC.

[17]  William Millan,et al.  LILI Keystream Generator , 2000, Selected Areas in Cryptography.

[18]  Willi Meier,et al.  Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.