On a Resynchronization Weakness in a Class of Combiners with Memory

In some applications for synchronous stream ciphers frequent resynchronization or resynchronization upon request may be necessary. We describe a weakness in a class of combiners with one-bit memory which makes them vulnerable in such applications requesting resynchronization. A correlation attack based on chi-square criterion, which in some aspects complements the attack studied by Daemen et. al., is presented.

[1]  Ed Dawson,et al.  Fast Correlation Attacks on the Summation Generator , 2000, Journal of Cryptology.

[2]  Vladimir V. Chepyzhov,et al.  A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers , 2000, FSE.

[3]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.

[4]  Jovan Dj. Golic,et al.  A method for convergence analysis of iterative probabilistic decoding , 2000, IEEE Trans. Inf. Theory.

[5]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[6]  Walter T. Penzhorn,et al.  Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting Codes , 1996, FSE.

[7]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[8]  Joos Vandewalle,et al.  Resynchronization Weaknesses in Synchronous Stream Ciphers , 1994, EUROCRYPT.

[9]  James L. Massey,et al.  A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.

[10]  Willi Meier,et al.  Correlation properties of combiners with memory in stream ciphers , 1991, Journal of Cryptology.

[11]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[12]  David J. C. MacKay,et al.  A Free Energy Minimization Framework for Inference Problems in modulo 2 Arithmetic , 1994, FSE.

[13]  Andrew J. Clark,et al.  Divide and Conquer Attacks on Certain Classes of Stream Ciphers , 1994, Cryptologia.

[14]  Thomas Johansson,et al.  Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes , 1999, EUROCRYPT.

[15]  Hideki Imai,et al.  A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack , 2000, FSE.

[16]  Rainer A. Rueppel,et al.  Correlation Immunity and the Summation Generator , 1985, CRYPTO.

[17]  Hu Chuan-Gan,et al.  On The Shift Register Sequences , 2004 .

[18]  Mark Goresky,et al.  Cryptanalysis Based on 2-Adic Rational Approximation , 1995, CRYPTO.

[19]  Thomas Siegenthaler,et al.  Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences , 1985, EUROCRYPT.

[20]  Jovan Dj. Golic,et al.  Correlation properties of a general binary combiner with memory , 1996, Journal of Cryptology.

[21]  Alex Biryukov,et al.  Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.

[22]  Anne Canteaut,et al.  Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 , 2000, EUROCRYPT.

[23]  W. W. Peterson,et al.  Error-Correcting Codes. , 1962 .