Some results on fast correlation attacks
暂无分享,去创建一个
This thesis presents new results on fast correlation attacks on stream ciphers. In particular, fast correlation attacks on stream ciphers containing linear shift registers with an arbitrary number of taps, are considered. A general introduction to stream ciphers and correlation attacks is given. The introduction also presents standard properties of linear feedback shift registers and Boolean functions. Three different algorithms for fast correlation attacks are presented. The first algorithm transforms a part of the code stemming from the LFSR sequence into a convolutional code, and decodes the convolutional code using the Viterbi algorithm. A theoretical analysis for the algorithm is performed, using a random coding bound for convolutional codes. This algorithm is then modified by using Turbo code techniques. The third algorithm is based on a method to recover multivariate linear polynomials. An overview and a comparison of recently proposed algorithms for fast correlations attacks, is given. The LILI-128 keystream generator, a recent stream cipher proposal, is attacked by a fast correlation attack. Several stream ciphers working over an extension field have been proposed in the last few years. Most algorithms for fast correlation attacks are described over the binary alphabet. An algorithm is presented that generalizes previous work to an attack over any field. This thesis also propose a new algorithm for decoding a general linear code. This decoding problem have several applications in cryptology, such as the McEliece public key cryptosystem, the Stern identification scheme, and also in correlation attacks. (Less)