Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach

A recently proposed scheme for key stream generators based on the programmable cellular automata and a read only memory is considered. It is shown that, the effective secret key size is significantly smaller than its formal length. The scheme is cryptanalyzed assuming ciphertext only attack, and novel cryptanalytic approach is proposed much more efficient than the reported one based on the known plaintext attack. As a development of the proposed basic algorithm for the secret key reconstruction the fast one is also given. Efficiency of the fast algorithm originates from the iterative error-correction procedure based on the algebraic replica approach.

[1]  Jovan Dj. Golic,et al.  A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction , 1991, EUROCRYPT.

[2]  Jovan Dj. Golic,et al.  Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence , 1992, EUROCRYPT.

[3]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[4]  S. Wolfram Random sequence generation by cellular automata , 1986 .

[5]  Tsutomu Matsumoto,et al.  Incidence structures for key sharing , 1995 .

[6]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[7]  Miodrag J. Mihaljevic,et al.  A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function , 1994, ASIACRYPT.

[8]  Jennifer Seberry,et al.  Advances in Cryptology — AUSCRYPT '90 , 1990, Lecture Notes in Computer Science.

[9]  Jovan Dj. Golic,et al.  A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence , 1990, AUSCRYPT.

[10]  P. Pal Chaudhuri,et al.  Efficient characterisation of cellular automata , 1990 .

[11]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[12]  Willi Meier,et al.  Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.

[13]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[14]  Parimal Pal Chaudhuri,et al.  Vector Space Theoretic Analysis of Additive Cellular Automata and Its Application for Pseudoexhaustive Test Pattern Generation , 1993, IEEE Trans. Computers.