Skip to main content
Erschienen in: Cryptography and Communications 5/2021

19.07.2021

Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers

verfasst von: Ge Yao, Udaya Parampalli

Erschienen in: Cryptography and Communications | Ausgabe 5/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Espresso cipher is designed targeting 5G wireless communication systems. To achieve high efficiency, a maximum period Galois NLFSR is used as the only building block. The Galois NLFSR is constructed by a scalable method which converts a maximum LFSR to a Galois NLFSR. Based on this method, a new class of stream ciphers, namely maximum period Galois NLFSR-based stream ciphers can be designed. However, we identify a conditional equivalence problem in the design method and adopt the Type-II-to-Fibonacci transformation algorithm. We apply the algorithm to the Espresso cipher and successfully transform the Galois NLFSR to a Fibonacci LFSR with a nonlinear output function. The Espresso cipher is transformed to an LFSR filter generator. We break it by the fast algebraic attack and the Rønjom-Helleseth attack with complexity of 268.50 and 248.59 logical operations respectively. Moreover, we show that the entire class of maximum period Galois NLFSR-based stream ciphers can be transformed to LFSRs. Therefore, this kind of cipher is always equivalent to an LFSR filter generator. We discuss other related attacks and give suggestions for future design.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1–13. Springer, Berlin (2000) Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1–13. Springer, Berlin (2000)
2.
Zurück zum Zitat Dubrova, E., Hell, M.: Espresso: A stream cipher for 5G wireless communication systems. Cryptogr. Commun. 9(2), 273–289 (2017)MathSciNetCrossRef Dubrova, E., Hell, M.: Espresso: A stream cipher for 5G wireless communication systems. Cryptogr. Commun. 9(2), 273–289 (2017)MathSciNetCrossRef
3.
Zurück zum Zitat Dubrova, E.: A Scalable Method for Constructing Galois NLFSRs With Period 2n − 1 Using Cross-Join Pairs. IEEE Trans. Inf. Theory 59(1), 703–709 (2012)MathSciNetCrossRef Dubrova, E.: A Scalable Method for Constructing Galois NLFSRs With Period 2n − 1 Using Cross-Join Pairs. IEEE Trans. Inf. Theory 59(1), 703–709 (2012)MathSciNetCrossRef
4.
Zurück zum Zitat Dubrova, E.: A transformation from the Fibonacci to the Galois NLFSRs. IEEE Trans. Inf. Theory 55(11), 5263–5271 (2009)MathSciNetCrossRef Dubrova, E.: A transformation from the Fibonacci to the Galois NLFSRs. IEEE Trans. Inf. Theory 55(11), 5263–5271 (2009)MathSciNetCrossRef
5.
Zurück zum Zitat Courtois, N.T: Fast algebraic attacks on stream ciphers with linear feedback. In: Annual International Cryptology Conference, pp. 176–194. Springer, Berlin (2003) Courtois, N.T: Fast algebraic attacks on stream ciphers with linear feedback. In: Annual International Cryptology Conference, pp. 176–194. Springer, Berlin (2003)
6.
Zurück zum Zitat Hawkes, P., Rose, G.G.: Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In: Annual International Cryptology Conference, pp. 390–406. Springer, Berlin (2004) Hawkes, P., Rose, G.G.: Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In: Annual International Cryptology Conference, pp. 390–406. Springer, Berlin (2004)
7.
Zurück zum Zitat Ronjom, S., Helleseth, T.: A new attack on the filter generator. IEEE Trans Inf Theory 53(5), 1752–1758 (2007)MathSciNetCrossRef Ronjom, S., Helleseth, T.: A new attack on the filter generator. IEEE Trans Inf Theory 53(5), 1752–1758 (2007)MathSciNetCrossRef
8.
Zurück zum Zitat Golomb, SW.: Shift register sequences. Aegean Park Press (1967) Golomb, SW.: Shift register sequences. Aegean Park Press (1967)
9.
Zurück zum Zitat Dubrova, E.: An equivalence-preserving transformation of shift registers. In: International Conference on Sequences and Their Applications, pp. 187–199. Springer, Cham (2014) Dubrova, E.: An equivalence-preserving transformation of shift registers. In: International Conference on Sequences and Their Applications, pp. 187–199. Springer, Cham (2014)
10.
Zurück zum Zitat Wang, L., Shen, B., Qiao, T.: Searching short recurrences of nonlinear shift registers via directed acyclic graphs. In: International Conference on Information Security and Cryptology, pp. 44–56. Springer, Berlin (2011) Wang, L., Shen, B., Qiao, T.: Searching short recurrences of nonlinear shift registers via directed acyclic graphs. In: International Conference on Information Security and Cryptology, pp. 44–56. Springer, Berlin (2011)
11.
Zurück zum Zitat Zhiqiang, L.: The transformation from the Galois NLFSR to the Fibonacci configuration. In: Fourth International Conference on Emerging Intelligent Data and Web Technologies, pp. 335–339. IEEE (2013) Zhiqiang, L.: The transformation from the Galois NLFSR to the Fibonacci configuration. In: Fourth International Conference on Emerging Intelligent Data and Web Technologies, pp. 335–339. IEEE (2013)
12.
Zurück zum Zitat Lu, J., Li, M., Huang, T., Liu, Y., Cao, J.: The transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor product of matrices. Automatica 96, 393–397 (2018)MathSciNetCrossRef Lu, J., Li, M., Huang, T., Liu, Y., Cao, J.: The transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor product of matrices. Automatica 96, 393–397 (2018)MathSciNetCrossRef
13.
Zurück zum Zitat Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 345–359. Springer, Berlin (2003) Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 345–359. Springer, Berlin (2003)
14.
Zurück zum Zitat Key, E.: An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Trans. Inf. Theory 22(6), 732–736 (1976)CrossRef Key, E.: An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Trans. Inf. Theory 22(6), 732–736 (1976)CrossRef
15.
Zurück zum Zitat Zhang, J., Qi, W.: Cryptanalysis of an equivalent model of stream cipher espresso. J. Cryptol. Res. 3(1), 91–100 (2016) Zhang, J., Qi, W.: Cryptanalysis of an equivalent model of stream cipher espresso. J. Cryptol. Res. 3(1), 91–100 (2016)
16.
Zurück zum Zitat Wang, M.X., Lin, D.D.: Related Key Chosen IV Attack on Stream Cipher Espresso Variant. In: IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 580–587. IEEE (2017) Wang, M.X., Lin, D.D.: Related Key Chosen IV Attack on Stream Cipher Espresso Variant. In: IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 580–587. IEEE (2017)
18.
Zurück zum Zitat Ge, Y., Udaya, P.: Improved Transformation Algorithms for Generalized Galois NLFSRs Submitted to Cryptography and Communications (2020) Ge, Y., Udaya, P.: Improved Transformation Algorithms for Generalized Galois NLFSRs Submitted to Cryptography and Communications (2020)
Metadaten
Titel
Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers
verfasst von
Ge Yao
Udaya Parampalli
Publikationsdatum
19.07.2021
Verlag
Springer US
Erschienen in
Cryptography and Communications / Ausgabe 5/2021
Print ISSN: 1936-2447
Elektronische ISSN: 1936-2455
DOI
https://doi.org/10.1007/s12095-021-00511-0

Weitere Artikel der Ausgabe 5/2021

Cryptography and Communications 5/2021 Zur Ausgabe